Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

From a security perspective, finance is one of the most challenging business sectors. You need the highest levels of confidentiality and assurance. You also need risk mitigation and analysis models to cope with a fast, and ever-changing, environment.

We collaborate closely with financial sector and law enforcement professionals to address these issues. Projects have included developing an investigatory framework (with the FSA and Northumbria Police) and working with the Scottish Police to create a secure inter-domain information sharing architecture.

Our researchers are also building new high security e-Health systems based on cloud computing. This recent collaboration with both Chelsea and Westminster Hospital and Microsoft plc has led to the creation of a next generation healthcare infrastructure, with increased levels of human and digital trust.

[Read More]


Contact linked in profile of Cyber-Security web page for Cyber-Security

+44 (0)131 455 2759

Room C53
Merchiston Campus
10 Colinton Road
EH10 5DT

Selected Publications

Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law, 22, (2), 113-139.

Flandrin, F., Buchanan, W., Macfarlane, R., Ramsay, B., Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In: (Ed.) 7th International Conference : Cybercrime Forensics Education & Training, , () ( ed.). (pp. ). : . .

Spyra, G., Buchanan, W., Cruickshank, P., Ekonomou, E. (2014). CLOUD-BASED IDENTITY AND IDENTITY META-DATA: SECURE AND CONTROL OWN DATA IN GLOBALIZATION ERA. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 3, (1), 49-66.

Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., Russell, G. (2015). Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System. In: (Ed.) Proceedings of HCI International 2015, , () ( ed.). (pp. ). : . .

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., Russell, G. (2015). Teaching Penetration and Malware Analysis in a Cloud-based Environment. In: (Ed.) Proceedings of the 1st Uk Workshop on Cybersecurity Training & Education, , () ( ed.). (pp. ). : . .

Buchanan, W., Ukwandu, E., van Deursen (Hazelhoff Roelfze, N., Fan, L., Russell, G., Lo, O., Thuemmler, C. (2015). Secret Shares to Protect Health Records in Cloud-based Infrastructures. In: (Ed.) Proceedings of the IEEE 17th International Conference on E-health Networking, Application and Services (HealthCom), , () ( ed.). (pp. 669 - 672). Boston, MA: . IEEE.