Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated ....Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementation provided. The project will combine the expertise in electronic voting schemes at QUT with that of Dr Lee.Read moreRead less
Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the ....Secure Electronic Voting with Flexible Ballot Structure. It is inevitable that electronic voting will eventually replace current paper based voting schemes. Despite considerable research no secure solution is available for an electronic voting scheme allowing complex election rules, such as preferential voting used in Australia. The main outcome of the research will be the fundamental knowledge required to develop general secure and flexible electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementaion provided.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will i ....Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will improve industry trust and confidence in participating in the sharing of sensitive information; especially the disclosure of potential vulnerabilities or ascertained potential threats. The project will improve information dissemination speeds and assist post information disclosure controls. Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will un ....Specifications, Proofs and Animations for Cryptographic Protocols. Cryptographic protocols are fundamental security tools for electronic communications. Despite years of intensive research it remains difficult to obtain high confidence in the security of almost any new protocol. Research in the computer security community has emphasised formal specifications and state based searching, while the cryptographic community has concentrated instead on complexity theoretic proofs. This project will unify these two approaches for the first time by formally specifying and animating the very models used in cryptographic proofs. The result will be proofs that are uniquely accessible to practioners combined with increased confidence that the proofs are both correct and relevant.Read moreRead less
Special Research Initiatives - Grant ID: SR0354476
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian ....Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian government and industry that provide and make smart use of information available on the Web. It will ensure Australian preparedness for the next-generation web technology.Read moreRead less
Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf ....Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter ....Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area. Read moreRead less