Research Topics in Cyber Security
A large variety of research topics is being studied within the centre, originating from the different disciplines and approaches within those.
- Authorisation Infrastructures
Role-based privilege management systems, such as the open source PERMIS system.
- Autonomous Security (Rogerio de Lemos and Chris Bailey and David Chadwick, Computing). Self-Adaptive Authorisation Framework
- Biometrics (Farzin Deravi, Mike Fairhurst, Richard Guest and Gareth Howells, EDA).
- Biometric interaction with Cyber domains (Richard Guest, EDA). In the superIdentity project.
- Cloud Security (David Chadwick, Computing and Gareth Howells, EDA).
- Computer Forensics (Julio Hernandez-Castro, Computing and (Stuart Gibson, Physical Sciences)
- Cryptography and Formal Methods (Eerke
Formal Methods provide ways of gaining confidence in correctness of systems through mathematics and logic based techniques. This research investigates the application of such methods to cryptographic primitives and protocols, bringing together the UK research communities in these areas.
- Data protection legislation and security (Lisa Dickson, Law)
- Forensic applications of digital image processing (Stuart Gibson, Physical Sciences)
- Reverse Engineering and Vulnerability Analysis (Andy King, Computing).
- RFID Security (Julio Hernandez-Castro, Computing)
- Secure Event Processing (Matteo Migliavacca, Computing)
- Social influence on social networks (Jim Ang and Farzin Deravi, EDA, and Karen Douglas, Psychology)
- Steganography and Steganalysis (Julio Hernandez-Castro, Computing)
- Template-Free Encryption (Gareth Howells, EDA).
- Trust and Federated Identity Management ( David Chadwick and Richard Guest)
- Wildlife trade and related criminal activities over the internet (David Roberts, Anthropology and Conservation).