Email: t (dot) martin (at) mmu (dot) ac (dot) uk
Security is no something that can be solved for us, or something that can be bought. We constantly need to make security decisions. As technology becomes more important in our lives, the consequences of making the wrong decisions are becoming more severe. We need to explore the risks that surround us and how we can navigate them safely.
While one may be correct in saying "There is no such thing as 100% secure!", one is not necessarily being helpful.
I emphasise the practical aspects of security. I make good use of labs, typically employing a variety of virtual machines. I also encourage the development of programming skills to automate simple tasks and explore systems in greater detail than normally possible.
Practicing attacks is an illustrative exercise in preparing suitable defences (not to mention how much fun hacking can be!)
B. AlBelooshi, E. Damiani, K. Salah, T. Martin (2016). Securing Cryptographic Keys in the Cloud: A Survey. IEEE Cloud Computing. 3(4), pp.42-56.
M. Zaabi, K. Taha, TA. Martin (2015). The Use of Ontologies in Forensic Analysis of Smartphone Content. The Journal of Digital Forensics, Security and Law.
T. Martin, L. O’Toole, A. Jones On the Reliability of Cryptopometry. International Journal of Digital Crime and Forensics. 5(1), pp.27-38.
M. Alzaabi, C-Y. Yeun, TA. Martin (2011). Ensuring Anonymity for LBSs in Smartphone Environment. Journal of Information Processing Systems. 7(1), pp.121-136.
T. Martin, C. Durbin, M. Pawlewski, D. Parish (2010). A pseudonymous peer-2-peer review system for child protection on-line. Journal of International Commercial Law and Technology. 5(2), pp.82-89.
A. Jones, T. Martin (2010). Digital forensics and the issues of identity. Information Security Technical Report. 15(2), pp.67-71.
K. Alghafli, A. Jones, T. Martin (2010). Forensic Analysis of the Windows 7 Registry. Journal of Digital Forensics, Security and Law. pp.1-17.
T. Martin, KM. Martin, P. Wild (2009). Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Designs, Codes and Cryptography. 51(3), pp.315-334.
T. Martin (2013). Cryptography for the Forensics Investigator. In: Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, pp.62-83.
B. AlBelooshi, K. Salah, T. Martin, E. Damiani (2015). Securing Cryptographic Keys in the IaaS Cloud Model. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). Limassol, CYPRUS, 7/12/2015. pp.397-401.
B. AlBelooshi, K. Salah, T. Martin, E. Damiani (2015). Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). 17/11/2015.
K. Almarashda, A. Dawood, T. Martin, M. Al-Mualla, H. Bhaskar (2015). An Optimized Selective Encryption for Video Confidentiality. In: IMAGE ANALYSIS AND RECOGNITION (ICIAR 2015). Niagara Falls, CANADA, 22/7/2015. pp.109-118.
B. Albelooshi, K. Salah, T. Martin, E. Damiani (2015). Experimental Proof: Data Remanence in Cloud VMs. In: 2015 IEEE 8th International Conference on Cloud Computing. New York, NY, 27/6/2015. pp.1017-1020.
Y. AlSalami, T. Martin, C. Yeun (2015). Linear and Differential Properties of Randomly Generated DES-Like Substitution Boxes. In: Lecture Notes in Electrical Engineering. pp.517-524.
K. Alghafli, A. Jones, T. Martin (2014). Investigating and Measuring Capabilities of the Forensics File Carving Techniques. In: Lecture Notes in Electrical Engineering. pp.329-336.
EA. Awadhi, K. Salah, T. Martin (2013). Assessing the security of the cloud environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC). 17/11/2013. pp.251-256.
M. Alzaabi, A. Jones, TA. Martin (2013). An Ontology-based Forensic Analysis Tool.
KA. Alghafli, A. Jones, TA. Martin (2012). Forensics Data Acquisition Methods for Mobile Phones. In: 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS. London, ENGLAND, 10/12/2012. pp.265-269.
B. AlBelooshi, K. Salah, TA. Martin, A. Bentiba (2012). Assessing Overhead Cost Associated with Encrypting Swap File.
A. Jones, T. Martin, M. Alzaabi (2012). The 2012 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE. In: Proceedings of the 10th Australian Digital Forensics Conference, ADF 2012. pp.47-53.
T. Martin, A. Jones (2011). An evaluation of data erasing tools. In: Proceedings of the 9th Australian Digital Forensics Conference. pp.84-92.
KA. Alghafli, A. Jones, TA. Martin (2011). Guidelines for the digital forensic processing of smartphones. In: Proceedings of the 9th Australian Digital Forensics Conference. pp.1-8.
K. AlMarashda, Y. AlSalami, K. Salah, T. Martin (2011). On the security of inclusion or omission of MixColumns in AES cipher. In: 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011. pp.34-39.
T. Martin (2011). Undecryptable symmetric encryption. In: 2011 IEEE GCC Conference and Exhibition (GCC). 19/2/2011. pp.225-228.
T. Martin, C. Durbin, M. Pawlewski, D. Parish (2010). Future vision of identity. In: International Journal of Liability and Scientific Enquiry. pp.86-86.
A. Jones, TA. Martin (2010). Making Information Security Acceptable to the User.