Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bob Duncan is active.

Publication


Featured researches published by Bob Duncan.


security of information and networks | 2014

Compliance with standards, assurance and audit: does this equal security?

Bob Duncan; Mark Whittington

Managing information security is a challenge. Traditional checklist approaches to meeting standards may well provide compliance, but do not guarantee to provide security assurance. The same might be said for audit. The complexity of IT relationships must be acknowledged and explicitly managed by recognising the implications of the self-interest of each party involved. We show how tensions between these parties can lead to a misalignment of the goals of security and what needs to be done to ensure this does not happen.


ieee international conference on cloud computing technology and science | 2013

Developing a Conceptual Framework for Cloud Security Assurance

Bob Duncan; David J. Pym; Mark Whittington

Managing information security in the cloud is a challenge. Traditional checklist approaches to standards compliance may well provide compliance, but do not guarantee to provide security assurance. The complexity of cloud relationships must be acknowledged and explicitly managed by recognising the implications of self-interest of each party involved. We begin development of a conceptual modelling framework for cloud security assurance that can be used as a starting point for effective continuous security assurance, together with a high level of compliance.


ieee international conference on cloud computing technology and science | 2014

Reflecting on Whether Checklists Can Tick the Box for Cloud Security

Bob Duncan; Mark Whittington

All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.


international conference on innovative computing technology | 2016

Enhancing cloud security and privacy: Time for a new approach?

Bob Duncan; Alfred Bratterud; Andreas Happe

Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of unikernel based systems. The main thrust of this paper is to discuss the key issues which need to be addressed, noting which of those might be covered by our proposed approach. We discuss how our proposed approach may help better address the key security issues we have identified.


ieee international conference on cloud computing technology and science | 2015

The Importance of Proper Measurement for a Cloud Security Assurance Model

Bob Duncan; Mark Whittington

Defining proper measures for evaluating the effectiveness of an assurance model, which we have developed to ensure cloud security, is vital to ensure the successful implementation and continued running of the model. We need to understand that with security being such an essential component of business processes, responsibility must lie with the board. The board must be responsible for defining their security posture on all aspects of the model, and therefore must also be responsible for defining what the necessary measures should be. Without measurement, there can be no control. However, it will also be necessary to properly engage with cloud service providers to achieve a more meaningful degree of security for the cloud user.


ieee acm international conference utility and cloud computing | 2016

Enterprise IoT security and scalability: how unikernels can improve the status Quo

Bob Duncan; Andreas Happe; Alfred Bratterud

Cloud computing has been a great enabler for both the In-ternet of Things and Big Data. However, as with all newcomputing developments, development of the technology is usually much faster than consideration for, and development of, solutions for security and privacy. In a previous paper, we proposed that a unikernel solution could be used to improve security and privacy in a cloud scenario. In this paper, we outline how we might apply this approach to the Internet of Things, which can demonstrate an improvement over existing approaches.


ieee international conference on cloud computing technology and science | 2015

Information Security in the Cloud: Should We be Using a Different Approach?

Bob Duncan; Mark Whittington

Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?


The 2nd International Conference on Complexity, Future Information Systems and Risk | 2017

Unikernels for Cloud Architectures : How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security

Andreas Happe; Bob Duncan; Alfred Bratterud

ACKNOWLEDGEMENTS This work was in part funded by the European Commission through grant agreement no 644962 (PRISMACLOUD).


Archive | 2017

Cloud Cyber Security: Finding an Effective Approach with Unikernels

Bob Duncan; Andreas Happe; Alfred Bratterud

Achieving cloud security is not a trivial problem to address. Developing and enforcing good cloud security controls are fundamental requirements if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of well-designed unikernel-based systems. We have identified a range of issues, which need to be dealt with properly to ensure a robust level of security and privacy can be achieved. We have addressed these issues in both the context of conventional cloud-based systems, as well as in regard to addressing some of the many weaknesses inherent in the Internet of things. We discuss how our proposed approach may help better address these key security issues which we have identified.


International Workshop on Enterprise Security | 2017

Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements

Bob Duncan; Mark Whittington; Martin Gilje Jaatun; Alfredo Ramiro Reyes Zúñiga

In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.

Collaboration


Dive into the Bob Duncan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andreas Happe

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Alfred Bratterud

Oslo and Akershus University College of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Victor Chang

Xi'an Jiaotong-Liverpool University

View shared research outputs
Top Co-Authors

Avatar

David J. Pym

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alfredo Ramiro Reyes Zúñiga

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge