XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows hi ....Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows him/her to roam, and to set up ad-hoc networks with other users. This research will thus contribute to Australia's increased productivity. Just as importantly, this project addresses fundamental research; it will increase Australia's knowledge base and provide training for students and researchers in how to think about communications problems.Read moreRead less
Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We a ....Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We aim to investigate two such issues: the impact of
channel uncertainty at the receiver, and the impact of multiple access
interference. This research will provide new directions for the design
of wireless data networks.
Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to t ....Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to tackle this problem by exploring new index coding techniques that are robust to failures in wireless and wired network links. Using advanced mathematical tools from algebraic number theory and module theory, the project aims to design optimally bandwidth-efficient index coding schemes that enable timely and reliable content distribution to end users.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Smart coding for improved performance of complexity constrained devices. The technical innovations of this project have the potential to have an immediate impact on compression technology. The overall expected outcome of the project consists of new compression algorithms for the australian telecommunications industry. The novel outcomes of the project lead to better quality images in video mobile communications applications. As such, the project operates at the forefront of innovative next gener ....Smart coding for improved performance of complexity constrained devices. The technical innovations of this project have the potential to have an immediate impact on compression technology. The overall expected outcome of the project consists of new compression algorithms for the australian telecommunications industry. The novel outcomes of the project lead to better quality images in video mobile communications applications. As such, the project operates at the forefront of innovative next generation mobile video telephony.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less