Here is a list of all my Cloud Security publications. Each publication is a link to the detail of the publication, with an option to download the paper.
Duncan, B., & Whittington, M. (2019). Invisible Ubiquity - Cloud Security in UK Corporate Annual Reporting. Proceedings of the Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, 6.
Zhao, Y., & Duncan, B. (2018). Fixing the Cloud Forensic Problem with Blockchain. International Journal on Advances in Security, 11(3&4), 243–253.
Duncan, B. (2018). Will Compliance with the New EU General Data Protection Regulation Lead to Better Cloud Security? International Journal on Advances in Security, 11(3&4), 254–263.
Duncan, B., Happe, A., & Bratterud, A. (2018). Achieving GDPR Compliance with Unikernels. International Journal on Advances in Security, 11(3&4), 223–231.
Duncan, B., & Whittington, M. (2018). The Complexities of Auditing and Securing Systems in the Cloud — is there a Solution and will the GDPR move it up the Corporate Agenda? International Journal on Advances in Security, 11(3&4), 232–242.
Bob Duncan. (2018). Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), 195–199.
Duncan, B., Lee, Y. W., & Olmsted, A. (2018). CLOUD COMPUTING 2018. The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, 165.
Duncan, B., Happe, A., & Bratterud, A. (2018). Using Unikernels to Address the Cloud Forensic Problem and help Achieve EU GDPR Compliance. Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, February, 71–76.
Duncan, B. (2018). Can EU General Data Protection Regulation Compliance be Achieved When Using Cloud Computing? Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, February, 1–6.
Anomelechi, N., Cooper, W., Duncan, B., & Lamb, J. D. (2018). A Management View of Security and Cloud Computing. Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, February, 25–30.
Duncan, B., & Whittington, M. (2018). Can Forensic Audit Help Address the Cloud Forensic Problem in Light of the Requirements of the Forthcoming European Union General Data Protection Regulation? Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, February, 84–89.
Duncan, B., & Zhao, Y. (2018). Risk Management for Cloud Compliance with the EU General Data Protection Regulation. The 7th International Workshop on Security, Privacy and Performance in Cloud Computing (SPCLOUD 2018), 8.
Beacham, N., & Duncan, B. (2018). Application of a Secure Cloud Based Learning Environment for Inclusive Practice in Mainstream Education: A Higher Education Case Study. Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization.
Duncan, B. (2018). FAST-CFP: Finding a Solution To The Cloud Forensic Problem. The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, 3.
Duncan, B., & Whittington, M. (2017). Creating an Immutable Database for Secure Cloud Audit Trail and System Logging. International Journal on Advances in Security, 10(3&4), 1–12.
Duncan, B., Whittington, M., & Chang, V. (2017). Enterprise Security and Privacy: Why Adding IoT and Big Data Makes It So Much More Difficult. DAES 2017: The Third International Workshop on Data Analytics and Emerging Services (DAES) with the International Conference on Engineering and Technology 2017, 1–6.
Duncan, B., & Whittington, M. (2017). Cyber Security for Cloud and the Internet of Things: How Can it be Achieved? Engineering & Technology Reference, 1(1), 1–39. https://doi.org/10.1049/etr.2017.0001
Duncan, B., Happe, A., & Bratterud, A. (2017). Cloud Cyber Security: Finding an Effective Approach with Unikernels. In Advances in Security in Computing and Communication (pp. 31–60). https://doi.org/http://dx.doi.org/10.5772/67801
Happe, A., Duncan, B., & Alfred Sewitsky Bratterud. (2017). Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security. COMPLEXIS 2017 - Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk, 1–12.
Bratterud, A., Happe, A., & Duncan, B. (2017). Enhancing Cloud Security and Privacy: The Unikernel Solution. Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 1–8.
Weir, G., Aßmuth, A., Whittington, M., & Duncan, B. (2017). Cloud Accounting Systems, the Audit Trail, Forensics and the EU GDPR: How Hard Can It Be? The British Accounting and Finance Association: Scottish Area Group Annual Conference, 6.
Tobin, P., McKeever, M., Blackledge, J., Whittington, M., & Duncan, B. (2017). UK Financial Institutions Stand to Lose Billions in GDPR Fines: How can They Mitigate This? In BAFA (Ed.), The British Accounting and Finance Association: Scottish Area Group Annual Conference (p. 6).
Duncan, B. (2017). FAST-CCS: Finding a Solution to Cloud Cyber Security. The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 1–3. https://www.iaria.org/conferences2017/filesCLOUDCOMPUTING17/FASTCCS.pdf
Hurst, W., Shone, N., Rhalibi, A. El, Happe, A., Kotze, B., & Duncan, B. (2017). Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education. Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 1–6. https://pure.abdn.ac.uk:8443/ws/files/92762670/28006.pdf
Duncan, B., Zhao, Y., & Whittington, M. (2017). Corporate Governance, Risk Appetite and Cloud Security Risk: A Little Known Paradox. How Do We Square the Circle? Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 1–6.
Westphall, C., Lee, Y., Duncan, R., Olmsted, A. Vassilakopoulos, M. Lambrinoudakis, C. Katsikas, S., & Ege, R. (2017). CLOUD COMPUTING 2017 Proceedings - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. (Authors (ed.)). IARIA.
Duncan, B., & Whittington, M. (2017). Creating an Immutable Database for Secure Cloud Audit Trail and System Logging. Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 54–59.
Beacham, N., & Duncan, B. (2017). Development of a Secure Cloud Based Learning Environment for Inclusive Practice in Mainstream Education. Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 1–4.
Duncan, B., & Whittington, M. (2016). Cloud cyber-security: Empowering the audit trail. International Journal on Advances in Security, 9(3 & 4), 169–183.
Duncan, B., Happe, A., & Bratterud, A. (2016). Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo. 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016), 1–6. https://doi.org/10.1145/2996890.3007875
Duncan, B., & Whittington, M. (2016). Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail. Cloud Computing 2016: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, April, 125–130.
Duncan, B., & Whittington, M. (2016). Enhancing Cloud Security and Privacy: The Cloud Audit Problem. Cloud Computing 2016: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, 119–124.
Duncan, B., Whittington, M., Jaatun, M. G., & Zúñiga, A. R. R. (2016). Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements? In V. Chang, M. Ramachandran, R. Walters, & G. Wills (Eds.), Enterprise Security Springer Book 2016 (pp. 1–22). Springer.
Duncan, B., & Whittington, M. (2016). The importance of proper measurement for a cloud security assurance model. Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, 517–522. https://doi.org/10.1109/CloudCom.2015.91
Duncan, B., Bratterud, A., & Happe, A. (2016). Enhancing Cloud Security and Privacy: Time for a New Approach? Intech 2016, 1–6. https://doi.org/10.1109/INTECH.2016.7845113
Duncan, B., Whittington, M., & Chang, V. (2016). Enterprise Security: Why Do We Make It So Difficult? 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, October, 1–6. http://www.xjtlu.edu.cn/en/events/2016/10/33rd-euro-asia-management-studies-association-%28eamsa%29-annual-conference-call-for-papers
Duncan, B., & Whittington, M. (2016). Information security in the cloud: Should we be using a different approach? Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, 523–528. https://doi.org/10.1109/CloudCom.2015.92
Duncan, B., & Whittington, M. (2015). Enhancing cloud security and privacy: Broadening the service level agreement. Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, 1, 1088–1093. https://doi.org/10.1109/Trustcom.2015.487
Duncan, B., & Whittington, M. (2015). Company Management Approaches — Stewardship or Agency: Which Promotes Better Security in Cloud Ecosystems? In IARIA (Ed.), Cloud Computing 2015: The Sixth International Conference on Cloud Computing, GRIDs, and Virtualization (pp. 154–159). IEEE.
Duncan, B., & Whittington, M. (2015). Reflecting on whether checklists can tick the box for cloud security. Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, 2015-Febru(February), 805–810. https://doi.org/10.1109/CloudCom.2014.165
Duncan, B., & Whittington, M. (2014). Compliance with standards, assurance and audit: Does this equal security? ACM International Conference Proceeding Series, 2014-Septe, 77–84. https://doi.org/10.1145/2659651.2659711
Duncan, B., Pym, D. J., & Whittington, M. (2013). Developing a Conceptual Framework for Cloud Security Assurance. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 120–125. https://doi.org/10.1109/CloudCom.2013.144