Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Situated Design Computing: A New Paradigm to Support Design Using Situated Reasoning. A country like Australia with its twin disadvantages of distance from its large markets and small population as its own market has to found its goals in its wealth production on its ability to compete at the high value-adding loci of the economy. Design is a precursor to superior products and is one of the nation's high value-adding wealth generating activities. This project aims to lay the foundations for a ....Situated Design Computing: A New Paradigm to Support Design Using Situated Reasoning. A country like Australia with its twin disadvantages of distance from its large markets and small population as its own market has to found its goals in its wealth production on its ability to compete at the high value-adding loci of the economy. Design is a precursor to superior products and is one of the nation's high value-adding wealth generating activities. This project aims to lay the foundations for a new class of design support tools that have the capacity to be used at a variety of stages in the design process including those stages where major decisions are being taken. This will have the potential to improve the efficacy and the efficiency of Australian design and hence make it more globally competitive.Read moreRead less
Analysing and Generating Fault-Tolerant Real-Time Systems. Safety-critical real-time systems are being deployed increasingly in diverse areas such as controlling critical infrastructure like transportation (e.g., railway signalling) as well as in defence applications (e.g., fly-by-wire). Such systems must be dependable and hence must be built using fault-tolerant strategies.
This project is researching frontier ICT technologies for analysing, designing and generating fault-tolerant systems, con ....Analysing and Generating Fault-Tolerant Real-Time Systems. Safety-critical real-time systems are being deployed increasingly in diverse areas such as controlling critical infrastructure like transportation (e.g., railway signalling) as well as in defence applications (e.g., fly-by-wire). Such systems must be dependable and hence must be built using fault-tolerant strategies.
This project is researching frontier ICT technologies for analysing, designing and generating fault-tolerant systems, concentrating on their software control components.Read moreRead less
Verified Emulation of Legacy Mission Computer Systems. Processor obsolescence is a serious maintenance problem for long-lived computer control systems in military aircraft and other critical applications. A promising solution is to interpose an emulator program between the original "legacy" software and a replacement processor. Unfortunately, no techniques exist for accurately verifying that this procedure preserves the original system's functional and timing behaviour. A particular challenge ....Verified Emulation of Legacy Mission Computer Systems. Processor obsolescence is a serious maintenance problem for long-lived computer control systems in military aircraft and other critical applications. A promising solution is to interpose an emulator program between the original "legacy" software and a replacement processor. Unfortunately, no techniques exist for accurately verifying that this procedure preserves the original system's functional and timing behaviour. A particular challenge is that processor emulations involve both legacy code and new subroutines, written in different programming languages. This project will enable verification of safety and mission-critical emulated systems by devising a multilingual modelling and reasoning formalism, based on program refinement theory.Read moreRead less
Better Planning for and Managing Asymmetric Threats to Australia's Security: Applying the Field Anomaly Relaxation (FAR) Systems Thinking Approach. Despite an enviable national security condition, Australia is at risk in an information-abundant world that increasingly spawns asymmetric threats such as information terrorism. What is needed are enhanced strategic and operational structures to improve the nation's security and ensure sound futures planning. This research focuses on applying the Fie ....Better Planning for and Managing Asymmetric Threats to Australia's Security: Applying the Field Anomaly Relaxation (FAR) Systems Thinking Approach. Despite an enviable national security condition, Australia is at risk in an information-abundant world that increasingly spawns asymmetric threats such as information terrorism. What is needed are enhanced strategic and operational structures to improve the nation's security and ensure sound futures planning. This research focuses on applying the Field Anomaly Relaxation (FAR) systems thinking approach to asymmetric information warfare threats to Australia. This is a new approach previously developed by ECU researchers investigating risk and innovation in the armed forces. It will now be extended to improve professional practice and the knowledge and skill base of Australia's information defence practitioners.Read moreRead less
Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf ....Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.Read moreRead less
Novel approaches to the forensic identification of human remains: integration of studies of bone form and chemistry. In a global era of terrorism, crime and even natural disasters, new approaches to identify victims, and prosecute offenders, are greatly required and long overdue. The combination of new computer and chemical methods will help identify unknowns, reconstruct missing parts and separate commingled remains. Its affect on understanding bones may be like that of DNA on soft tissues. The ....Novel approaches to the forensic identification of human remains: integration of studies of bone form and chemistry. In a global era of terrorism, crime and even natural disasters, new approaches to identify victims, and prosecute offenders, are greatly required and long overdue. The combination of new computer and chemical methods will help identify unknowns, reconstruct missing parts and separate commingled remains. Its affect on understanding bones may be like that of DNA on soft tissues. The results will update our ability as forensic scientists to strengthen Australian security systems by improving our ability to manage accidents, disasters, terrorism and crime. This project will start international collaborations and train a new generation of Australian forensic experts.Read moreRead less
Molecular Fingerprinting: Forensic Spectroscopy of Trace Gases. Safeguarding Australia from terrorism, crime and invasive diseases is essential to securing our national infrastructure. This project will develop national capabilities in anticipating and responding to critical threats to society. The scientific instrumentation developed from this effort will enhance Australia's potential aid for early detection of explosive and chemical weaponry and also in the analysis of crime scenes. This rese ....Molecular Fingerprinting: Forensic Spectroscopy of Trace Gases. Safeguarding Australia from terrorism, crime and invasive diseases is essential to securing our national infrastructure. This project will develop national capabilities in anticipating and responding to critical threats to society. The scientific instrumentation developed from this effort will enhance Australia's potential aid for early detection of explosive and chemical weaponry and also in the analysis of crime scenes. This research will significantly improve our abilities to maintain the operational advantage of Australia's security agencies through superior capabilities in threat detection.Read moreRead less
Coordination and communication in critical care: Assessing potential technology support. This project will examine temporal coordination demands of busy critical care environments, with the goal of developing better models and tools for evaluating the impact of information and communication technology (ICT) innovation. Millions of dollars can be wasted on healthcare ICT updates when the nature of critical care work, the means of communication, and temporal coordination demands are not fully unde ....Coordination and communication in critical care: Assessing potential technology support. This project will examine temporal coordination demands of busy critical care environments, with the goal of developing better models and tools for evaluating the impact of information and communication technology (ICT) innovation. Millions of dollars can be wasted on healthcare ICT updates when the nature of critical care work, the means of communication, and temporal coordination demands are not fully understood. The outcome of this project will be better conceptual and computational tools for assessing the impact of ICT innovation on safety-critical systems such as healthcare, so providing more cost-effective ICT solutions where there is rapidly-evolving ICT innovation.Read moreRead less
A New Approach to Studying Whole Bodies and Body Parts Applied to Problems of Forensic Science. To bring to the study of whole humans and human body parts, new methods capable of major advances such as those already provided by DNA technology in the study of human tissues, cells and molecules. This will allow better identification of human groups, geographic populations, gender differences and ageing.
To update facilities in forensic sciences strengthening Australian security systems thus he ....A New Approach to Studying Whole Bodies and Body Parts Applied to Problems of Forensic Science. To bring to the study of whole humans and human body parts, new methods capable of major advances such as those already provided by DNA technology in the study of human tissues, cells and molecules. This will allow better identification of human groups, geographic populations, gender differences and ageing.
To update facilities in forensic sciences strengthening Australian security systems thus helping fight terrorism and crime.
To establish international collaborations for Australia, especially with Asia.
To train young people, through Master's and Doctoral degrees programmes, in handling the new techniques and applying them to problems of forensic science
Read moreRead less