Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration ....An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration problems faced by current industries. The development of a reliable and flexible infrastructure will benefit small and medium-scale enterprises, as they will be able to participate in large-scale supply chains and expand their business, without having to invest in expensive new computer systems and software.Read moreRead less
Designing an Efficient and Scalable Infrastructure for Mobile Web Services. Mobile services (M-Services) are rapidly growing due to enormous proliferation of web services and of the wireless networks. However, because of the high dynamic nature of the Internet as well as the specific requirements of mobile environments, existing M-services have limitations as they lack support for flexible transactions. The aim of this project is to design an efficient mobile transaction-based infrastructure to ....Designing an Efficient and Scalable Infrastructure for Mobile Web Services. Mobile services (M-Services) are rapidly growing due to enormous proliferation of web services and of the wireless networks. However, because of the high dynamic nature of the Internet as well as the specific requirements of mobile environments, existing M-services have limitations as they lack support for flexible transactions. The aim of this project is to design an efficient mobile transaction-based infrastructure to support highly adaptable M-Services. This infrastructure will provide robust and efficient management of business transactions across different enterprises. The outcomes of this project will include a set of advanced techniques and algorithms that will form the basis of the next generation of mobile web services.Read moreRead less
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advance ....Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advanced IT support for health care, which can be utilised by other providers. (d) The project will make a direct link between IT research and its industrial application. (e) The project will also give the opportunity to a postdoctoral researcher and PhD students to perform leading edge research on privacy protection of information in an industrial environment.Read moreRead less
Designing a Scalable and Robust Infrastructure for Highly Dynamic Web Services. Web services are modular Internet-based applications that communicate with one another over the Internet. However, because of the high dynamic nature of the Internet, existing web services have profound limitations as they lack the support of semantic-based service discovery and dynamic service composition. This project aims at designing a robust and scalable infrastructure to support highly dynamic web services. Thi ....Designing a Scalable and Robust Infrastructure for Highly Dynamic Web Services. Web services are modular Internet-based applications that communicate with one another over the Internet. However, because of the high dynamic nature of the Internet, existing web services have profound limitations as they lack the support of semantic-based service discovery and dynamic service composition. This project aims at designing a robust and scalable infrastructure to support highly dynamic web services. This infrastructure will provide an adaptive e-business platform enabling optimal integration of enterprise' complex business processes across external systems and third party applications. The outcomes will be a set of advanced techniques and algorithms that will form the basis of the next generation of e-business solutions.Read moreRead less
Multi-agent Framework for Service Level Management. The Internet based e-services are being used by many businesses as part of the modern e-business environment. Management of e-services over the Internet involves complex correlation of events, and their sequences over geographically dispersed networks, systems and software applications. The integration of management information is a challenging problem due to the semantic differences of services across different business sectors (e.g., healthca ....Multi-agent Framework for Service Level Management. The Internet based e-services are being used by many businesses as part of the modern e-business environment. Management of e-services over the Internet involves complex correlation of events, and their sequences over geographically dispersed networks, systems and software applications. The integration of management information is a challenging problem due to the semantic differences of services across different business sectors (e.g., healthcare, retail and telecommunications). This project aims to develop a new framework for the integrated management of networked services using multiple software agents; some of them are already a part of the current Internet infrastructure (e.g., search engines).Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Protecting Web Services from Distributed Denial of Service Attacks. Distributed denial-of-service (DDoS) attacks bring a tremendous threat to web services on the Internet. Large amount of web services were pulled down worldwide by the DDoS attacks, with huge losses in business. Effective approaches to defeat DDoS attacks are desperately demanded. Most existing DDoS defense systems aim to only protect the victim network and are not fully integrated. In this project we propose a novel defense syst ....Protecting Web Services from Distributed Denial of Service Attacks. Distributed denial-of-service (DDoS) attacks bring a tremendous threat to web services on the Internet. Large amount of web services were pulled down worldwide by the DDoS attacks, with huge losses in business. Effective approaches to defeat DDoS attacks are desperately demanded. Most existing DDoS defense systems aim to only protect the victim network and are not fully integrated. In this project we propose a novel defense system to protect web services from DDoS attacks. Our system is one of the first systems that have a mixture deployment in both victim end and attack source end, and integrated capabilities of intrusion surveillance, traffic control, and traceback, thus achieve better control results over other mechanisms.Read moreRead less
Analysis of effective offshoring processes for Australian organisations. The offshore outsourcing of business processes is a new, largely unexplored and under-theorised area that is placing great pressure on Australian organisations. This research aims to develop models of best practice for offshoring by Australian organisations through a series of cases studies commencing with the industry partner, Repcol Limited. The research will identify what business processes are core, what processes can b ....Analysis of effective offshoring processes for Australian organisations. The offshore outsourcing of business processes is a new, largely unexplored and under-theorised area that is placing great pressure on Australian organisations. This research aims to develop models of best practice for offshoring by Australian organisations through a series of cases studies commencing with the industry partner, Repcol Limited. The research will identify what business processes are core, what processes can be offshored, whether to use third parties or have captive operations, and what factors need to be addressed in order to utilise offshoring to strengthen Australian organisations and enable them to take advantage of global strategic opportunities for growth.Read moreRead less