Special Research Initiatives - Grant ID: SR0354476
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian ....Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian government and industry that provide and make smart use of information available on the Web. It will ensure Australian preparedness for the next-generation web technology.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0668502
Funder
Australian Research Council
Funding Amount
$500,000.00
Summary
Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an ....Queensland Computational Grid Enhancement Project. State-of-the-art computational facilities will be made available to enhance research outcomes in vital areas such as environmental and sustainability modelling, security and medical engineering and thus play an important role in advancing scientific and engineering discovery within Queensland and Australia. The new computational systems will be made available on a Queensland wide basis through the Queensland Parallel Supercomputing Foundation an initiative supported by Queensland universities and the State Government. The new infrastructure will support more than 390 researchers, is consistent with the national supercomputing framework and directly supports ARC research that addresses all four key national research priorities.Read moreRead less
Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter ....Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area. Read moreRead less
Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated ....Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementation provided. The project will combine the expertise in electronic voting schemes at QUT with that of Dr Lee.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will i ....Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will improve industry trust and confidence in participating in the sharing of sensitive information; especially the disclosure of potential vulnerabilities or ascertained potential threats. The project will improve information dissemination speeds and assist post information disclosure controls. Read moreRead less