Robert John Walters

Robert John Walters
University of Southampton · Department of Electronics and Computer Science (ECS)

About

162
Publications
153,322
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,825
Citations
Citations since 2016
56 Research Items
2181 Citations
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400

Publications

Publications (162)
Article
Full-text available
The eGovernment initiative is aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuit...
Article
Full-text available
Electronic government (e-Government) enables outstanding improvements to be made to services for the public by the government. This is achieved through improvements to service quality and availability for which access can be given regardless of place and time. In Indonesia, the implementation of e-Government is still not extensively comprehensive a...
Article
Full-text available
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected devices that are predicted toreach about 50 billion by 2020. With proliferation of IoT devices and need to increase information sharing in IoT applications,risk-based access control model has become the best candidate for both academic and commercia...
Article
Despite the effort and copious resources Saudi Arabia is investing in its transition towards e-government, it is hindered by the weakness of the information and communication technology infrastructure in its government agencies. The development of a private government cloud is a solution for improving and standardising the ICT infrastructure, but c...
Chapter
Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing th...
Conference Paper
Full-text available
p>Electronic government (eGovernment) goals are improving the availability and quality of services that can be accessed regardless of time and place to improve government services to the public. In order to achieve this, the implementation of information assurance (IA) which its purpose is to ensure business continuity in the event of an incident i...
Conference Paper
Full-text available
p>The goals of electronic government (eGovernment) services are improving the availability and quality of services to enhance government services to the citizens. One way to achieve it is with the implementation of information assurance (IA) which the purpose is to minimise risks linked to information and systems and assuring business continuity in...
Article
Full-text available
The Internet of Things (IoT) has become one of the unprecedented research trends for both academic and commercial organizations. Every day, the publicity of the IoT is increased. This is because the unlimited benefits that the IoT can bring to our environment. The IoT has the ability to connect almost all objects of real-world to communicate and co...
Conference Paper
Full-text available
Nanotechnology provides new solutions for numerous applications that have a significant effect on almost every aspect of our community including health monitoring, smart cities, military, agriculture, and industry. The interconnection of nanoscale devices with existing communication networks over the Internet defines a novel networking paradigm cal...
Conference Paper
Full-text available
The Internet of Things (IoT) is a promising technology that can connect and communicate virtual and physical objects globally. It allows billions of devices to be connected and communicate with each other to share information that creates new application and services. These services result in improving our quality of life. On the other hand, Artifi...
Article
Full-text available
With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices. The fog provides IoT data processing and storage locally at IoT devices i...
Conference Paper
Full-text available
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant...
Poster
Full-text available
One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an efficient access control model for the IoT require selecting an appropriate access policy language to implement access policies. After reviewing different access policy languages, th...
Article
This article illustrates the importance of gathering and analyzing preprocessing data for unlisted but rich firms such as venture capital firms. Using datasets from three major sources, the authors demonstrate how to query and analyze data using both Datastream and SQL.
Conference Paper
E learning is an essential approach, and one which complements the traditional teaching approach. The use of e learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e learning and use it to train, teach, and deliver learning to students. Howeve...
Article
This paper demonstrates our proposed Multi-core architecture for a hybrid information system (HIS) with the related work, system design, theories, experiments, analysis and discussion presented. Different designs on clusters, communication between different types of chips and clusters and network queuing methods have been described. Our aim is to a...
Conference Paper
Full-text available
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure...
Article
In many developing countries such as Saudi Arabia the adoption of cloud computing is still at an early stage. This research aims to investigate the influencing factors in the decision to adopt cloud computing in the private sector. An integrated model is proposed incorporating critical factors derived from a literature review, along with other fact...
Data
Saudi universities have at their disposal a huge number of low cost IT resources to aid in teaching, research and learning. By migrating to cloud services, Saudi universities will be moving data and programs from local servers to the internet, thereby providing users with the ability to access and share information at any time from multiple devices...
Conference Paper
Full-text available
The Internet of Things (IoT) is becoming the next Internet-related revolution. It allows billions of devices to be connected and communicate with each other to share information that improves the quality of our daily lives. On the other hand, Cloud Computing provides on-demand, convenient and scalable network access which makes it possible to share...
Conference Paper
Full-text available
The Internet of Things (IoT) is creating a revolution in the number of connected devices. Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this number will almost double by 2020. Society has become dependent on these billions of devices, devices that are connected and communicating with each other all the tim...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
Conference Paper
Full-text available
The Internet of Things (IoT) represents a modern approach where boundaries between real and digital domains are progressively eliminated by changing over consistently every physical device to smart object ready to provide valuable services. These services provide a vital role in different life domains but at the same time create new challenges part...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
Article
Cloud computing technologies can play an essential role in public organisations and companies while it reduces the cost of using information technology services. It allows users to access the service anytime and anywhere, with paying for what they use. In developing countries, such as Saudi Arabia, the cloud computing is still not extensively adopt...
Conference Paper
Full-text available
Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in...
Article
Full-text available
In the last few years, the cloud-computing paradigm experienced a considerable growth, making it the de-facto technology fueling almost all major online services. Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in...
Chapter
Full-text available
Assessing the security of data stored in cloud storage can be carried out by developing goal-based measurement items. The measurement items can be utilized to construct a security assessment model based on practical needs. The measurement items can assist in acquiring support decision making on the implementation of a security frameworks. This pape...
Article
Full-text available
There are several benefits of using cloud computing in organizations and government agencies such as cost saving and flexibility in getting resources. Cloud computing plays a significant changing in organizations since it allows the users to access the service anytime and everywhere via networks, with paying for using only. In developing countries,...
Chapter
Full-text available
Any organisation using the internet to conduct business is vulnerable to violation of security. Currently security in most organizations relates to protection of data and the management of their business information systems. Hence, security is often de?ned as the protection of information, the system, and hardware; that use, store and relocates tha...
Conference Paper
Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in...
Book
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjun...
Article
Full-text available
With the rapid evolution of Information Technology (IT) applications and practices across the organization, appropriate IT Governance (ITG) has become essential to an organization’s success. As IT is associated with risk and value opportunities, a comprehensive, high-level system is required in each organization to minimise the associated risks and...
Chapter
Full-text available
In the last few years, the cloud computing paradigm experienced a considerable growth, making it the de-facto technology fuelling almost all major online services. At the same time, the concept of Internet of Things has started to gain mainstream traction with the promise to usher a new era of pervasive sensing using a weave of numerous inter-conne...
Conference Paper
Full-text available
Cloud computing technologies play a substantial role in public organizations and private sector companies since it reduces the cost of using information technology services and allows users to access the service anytime and everywhere, whilst only paying for what they use. In developing countries, such as Saudi Arabia, the cloud computing is still...
Conference Paper
Full-text available
Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in Europe and North America has harnessed the capabilities of cloud services to provide large scale flexibly electronic educational services. In Saudi Arabia, Most o...
Article
Saudi universities have at their disposal a huge number of low cost IT resources to aid in teaching, research and learning. By migrating to cloud services, Saudi universities will be moving data and programs from local servers to the internet, thereby providing users with the ability to access and share information at any time from multiple devices...
Article
This paper investigates the history of economic bubbles and attempts to identify whether there are direct correlations between different bubbles. To support this research, literature has been consulted on historical and recent bubbles, theories surrounding speculation, the market for venture capital, and bubbles in the technology sector. By analysi...
Article
While Data Science has become increasingly significant for business strategies, operations, performance, efficiency and prediction, there is little work on this to provide a detailed guideline. We have proposed a Business Data Science (BDS) model that focuses on the model and experimental development that allows different types of functions, proces...
Article
Full-text available
Although it has been around for 11 years, it is still not clear where Web 2.0 will lead. This paper presents a general discussion of past and recent trends that may positively influence the direction of Web 2.0, including cloud computing and other emerging business models. In order to move forward, Web 3.0 is proposed for the next generation of wor...
Conference Paper
Full-text available
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is bene...
Conference Paper
This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi author...
Article
Full-text available
There are several benefits of using cloud computing in organizations and government agencies such as cost saving and flexibility in getting resources. Cloud computing plays a significant changing in organizations since it allows the users to access the service anytime and everywhere via networks, with paying for using only. In developing countries,...
Conference Paper
Full-text available
There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goalbased security components for comparing them....
Article
Research associated with Big Data in the Cloud will be important topic over the next few years. The topic includes work on demonstrating architectures, applications, services, experiments and simulations in the Cloud to support the cases related to adoption of Big Data. A common approach to Big Data in the Cloud to allow better access, performance...
Article
Open Journal of Big Data (OJBD) is an open access journal addressing aspects of Big Data, including new methodologies, processes, case studies, poofs-of-concept, scientific demonstrations, industrial applications and adoption. This editorial presents three articles in the second issue. The first paper is on Big Data in the Cloud. The second paper i...
Conference Paper
Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcom...
Chapter
Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing th...
Chapter
Full-text available
This chapter presents a selected review for Cloud Computing and explains the issues and risks of adopting Cloud Computing in a business environment. Although all the risks identified may be associated with two major Cloud adoption challenges, a framework is required to support organisations as they begin to use Cloud and minimise risks of Cloud ado...
Conference Paper
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security threats and challenges of protecting their data from threats. Many security frameworks have been suggested by existing studies, governing bodies, industry standards etc. as guidelines to be implemented by cloud service providers (CSPs) but the...
Article
Full-text available
Cloud computing is an emerging technology which promises to bring with it great benefits to all types of computing activities including business support. However, the full commitment to Cloud computing necessary to gain the full benefit is a major project for any organisation, since it necessitates adoption of new business processes and attitudes t...
Article
Full-text available
This paper considers the performance of interconnection networks in single-core and multi-core cluster architectures. Several parameters and system configurations are considered to optimise the performance of single-core cluster as a baseline experiment. These results have been extended to multi-core cluster architectures. The performance measureme...
Article
Limitations imposed by the traditional practice in financial institutions of running price and risk analysis on the desktop drive analysts to use simplified models in order to obtain acceptable response times. Typically these models make assumptions about the distribution of market events like defaults. One popular model is Gaussian Copula which as...
Conference Paper
Full-text available
More and more data is stored in personal cloud storage and it is expected to grow further. As cloud storage is becoming an option for user in keeping their data online, it comes with the security threats and the challenges of protecting their data from unauthorised access. Many security controls have been implemented by cloud storage providers (CSP...
Article
The Open Journal of Big Data is a new open access journal addressing aspects of Big Data, including new methodologies, processes, case studies, poofs-of-concept, scientific demonstrations, industrial applications and adoption. This editorial presents the two articles in this first issue. The first paper is on An Efficient Approach for Cost Optimiza...
Article
Full-text available
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security requirements and challenges of protecting their data from threats. Many security frameworks have been suggested by existing studies, governing bodies, industry standards etc. as guidelines to be implemented by cloud service providers (CSPs) bu...