ARDC Research Link Australia Research Link Australia   BETA Research
Link
Australia
  • ARDC Newsletter Subscribe
  • Contact Us
  • Home
  • About
  • Feedback
  • Explore Collaborations
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation

Need help searching? View our Search Guide.

Advanced Search

Current Selection
Field of Research : Information Systems Management
Field of Research : Data Security
Clear All
Filter by Field of Research
Data Security (8)
Information Systems Management (8)
Data Format (4)
Information Systems (4)
Computer Software Not Elsewhere Classified (3)
Database Management (2)
Conceptual Modelling (1)
Health Information Systems (Incl. Surveillance) (1)
Operating Systems (1)
Filter by Socio-Economic Objective
Application tools and system utilities (7)
Computer software and services not elsewhere classified (4)
Information processing services (4)
Communication services not elsewhere classified (1)
Health and support services not elsewhere classified (1)
Other (1)
Filter by Funding Provider
Australian Research Council (8)
Filter by Status
Closed (8)
Filter by Scheme
Discovery Projects (6)
Linkage Projects (1)
Special Research Initiatives (1)
Filter by Country
Australia (8)
Filter by Australian State/Territory
NSW (3)
QLD (3)
VIC (2)
  • Researchers (12)
  • Funded Activities (8)
  • Organisations (10)
  • Funded Activity

    Discovery Projects - Grant ID: DP0449644

    Funder
    Australian Research Council
    Funding Amount
    $100,000.00
    Summary
    Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme .... Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0558522

    Funder
    Australian Research Council
    Funding Amount
    $178,000.00
    Summary
    Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an .... Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP1094799

    Funder
    Australian Research Council
    Funding Amount
    $180,000.00
    Summary
    Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings a .... Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings and its dependencies with social relations. They can greatly contribute to breakthrough techniques enabling trust-oriented social network analysis and more objective trust management systems that can be transferred to the Australian IT industry to promote the trustworthiness of Web services and reduce monetary loss.
    Read more Read less
    More information
    Funded Activity

    Special Research Initiatives - Grant ID: SR0567386

    Funder
    Australian Research Council
    Funding Amount
    $98,000.00
    Summary
    Mechanisms for Ultra-secure Access to Large Repositories of Sensitive Data over the Grid. Large repositories of data that are typically geographically distributed and are subject to varying degrees of legal and ethical constraints are not available for open scientific research due to the sensitive and private nature of the information they contain, e.g. personal health records offer significant value for medical research, but are not readily available due to privacy legislation and the requireme .... Mechanisms for Ultra-secure Access to Large Repositories of Sensitive Data over the Grid. Large repositories of data that are typically geographically distributed and are subject to varying degrees of legal and ethical constraints are not available for open scientific research due to the sensitive and private nature of the information they contain, e.g. personal health records offer significant value for medical research, but are not readily available due to privacy legislation and the requirement to maintain end-user’s trust in healthcare information system. This project will build a demonstrator, based upon advanced cryptographic and information research and technologies to provide ultra-secure and sanitized access to this data via a data network grid.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0770479

    Funder
    Australian Research Council
    Funding Amount
    $165,708.00
    Summary
    Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create .... Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0988411

    Funder
    Australian Research Council
    Funding Amount
    $190,000.00
    Summary
    Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da .... Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.
    Read more Read less
    More information
    Funded Activity

    Discovery Projects - Grant ID: DP0772493

    Funder
    Australian Research Council
    Funding Amount
    $217,000.00
    Summary
    Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom .... Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.
    Read more Read less
    More information
    Funded Activity

    Linkage Projects - Grant ID: LP0347620

    Funder
    Australian Research Council
    Funding Amount
    $240,000.00
    Summary
    Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf .... Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.
    Read more Read less
    More information

    Showing 1-8 of 8 Funded Activites

    Advanced Search

    Advanced search on the Researcher index.

    Advanced search on the Funded Activity index.

    Advanced search on the Organisation index.

    National Collaborative Research Infrastructure Strategy

    The Australian Research Data Commons is enabled by NCRIS.

    ARDC CONNECT NEWSLETTER

    Subscribe to the ARDC Connect Newsletter to keep up-to-date with the latest digital research news, events, resources, career opportunities and more.

    Subscribe

    Quick Links

    • Home
    • About Research Link Australia
    • Product Roadmap
    • Documentation
    • Disclaimer
    • Contact ARDC

    We acknowledge and celebrate the First Australians on whose traditional lands we live and work, and we pay our respects to Elders past, present and emerging.

    Copyright © ARDC. ACN 633 798 857 Terms and Conditions Privacy Policy Accessibility Statement
    Top
    Quick Feedback