Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our ....Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our work with several million dollars of investment. The result will put Australia on the international stage as a significant contributor to WSN technologies. By training PhD students, the project will also enrich local expertise in the technologies.Read moreRead less
XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Anticipatory, Adaptive, and Scalable Mobility Infrastructure for On-board Information Access. The recent advances in wireless technologies are offering new opportunities for ubiquitous information access in on-board mobile computing. Realising an effective on-board mobile computing infrastructure poses significant technical challenges at both application and data transport layers. Our approach features the integration of techniques from satellite communications, anticipatory transport protocols ....Anticipatory, Adaptive, and Scalable Mobility Infrastructure for On-board Information Access. The recent advances in wireless technologies are offering new opportunities for ubiquitous information access in on-board mobile computing. Realising an effective on-board mobile computing infrastructure poses significant technical challenges at both application and data transport layers. Our approach features the integration of techniques from satellite communications, anticipatory transport protocols, and personalised data management systems. The final outcome will be generic techniques and concepts for effective and efficient on-board access to global information sources and services (e.g., weather information, stock quotes, and infotainment). These concepts and techniques will have wider application scope, such as aeronautical, maritime and terrestrial public transport systems.Read moreRead less
Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integ ....Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integration areas. At the same time, the knowledge capacity of Australia on data integration will be enlarged which further improves frontier research activities in the area. Through the research of the project, PhD students will be trained.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale I ....Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale Internet broadcasting services while meeting user satisfaction with guaranteed Quality of Service. It is crucial for Australia to invest in this frontier technology since Australian service providers rely on expensive Internet infrastructure to communicate with major data hubs in other continents.Read moreRead less