security framework ()

Projects

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance policy infrastructure using a circle-of-trust relationship for assisted living, which then links to...
Information Sharing between the Police and their Community Partners
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
.net Mobile Agents
Mobile agents are capable of enhancing distributed applications due to their inherent characteristics, such as code and state mobility, network awareness, intelligence, and so on. The predominant development language of mobile agent systems is Java due to its platform independence and sandbox...
Data Capture and Auto Identification Reference
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a research project with the TSB (Technology Strategy Board).
FSA PhD Studentship
This studentship is in co-operation with the Financial Services Authority (FSA) and the original aim was to examine an issue in the area of e-commerce that could greatly affect the financial sector. Throughout the course of the research, a framework for the automatic evaluation of web sites has...

Members

William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759
Jamie Graves
Affiliate Research Fellow
j.graves@napier.ac.uk
+44 131 455
Robert Ludwiniak
Lecturer
r.ludwiniak@napier.ac.uk
+44 131 455 2780
Omair Uthmani
Academic
o.uthmani@napier.ac.uk
+44 131 455
Alastair Wilson
Visting Academic
A.Wilson2@napier.ac.uk
+44 131 455
Lu Fan
Senior Research Fellow
l.fan@napier.ac.uk
+44 131 455 2438
Owen Lo
Research Fellow
o.lo@napier.ac.uk
+44 131 455
Naghmeh Moradpoor
Lecturer in Cybersecurity and Networks
N.Moradpoor@napier.ac.uk
+44 131 455 2596
Nicole van Deursen (Hazelhoff Roelfze
Research Student
n.hazelhoffroelfzema@napier.ac.uk
+44 131 455

Publications

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.

Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: (Ed.) Cyberforensics 2011, , () ( ed.). (pp. ). : . .

Buchanan, W. (2011). Introduction to Security and Network Forensics ( ed.). : . Auerbach Publications.

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57 - 81.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.

Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . .

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11, (6), 442-461.

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25, (4), 293 - 314.

Smith, M., Buchanan, W., Thuemmler, C., Bell, D., van Deursen (Hazelhoff Roelfze, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care , , (), .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, , (), 394-402.

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82, (2), 197-206.

Saliou, L. (2009). Network Firewalls Dynamic Performance Evaluation and Formalisation (PhD). Edinburgh Napier University (Buchanan, W.).

Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10, (1-2), 119 - 131.

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK: . Academic Conferences International.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK,: . .

Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8, (5), 571-583.

Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, , () ( ed.). (pp. 308-313). John Moores University, Liverpool, UK: . PGNet.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: (Ed.) IEEE International Conference on Networking and Services, , () ( ed.). (pp. 87 - 87). Slicon Valley, CA: . IEEE Computer Society Press.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 205-214). Helsinki, Finland: . .

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security, , () ( ed.). (pp. 47-52). Glamorgan, United Kingdom: . Academic Conferences International.

Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , , (), 147 - 154.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security, , () ( ed.). (pp. 303-311). Glamorgan, United Kingdom: . Academic Conferences International.

Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Pikoulas, J. (2003). An Agent-based Bayesian Method for Network Intrusion Detection (PhD). Edinburgh Napier University (Buchanan, W.).