Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues ....Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues within these projects and develops improved modelling techniques and project management approaches for large modelling initiatives. The outcomes will streamline the design, integration, maintenance and communication of models with a focus on Enterprise Systems.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
Risk-aware business process management. Risk-aware business process management will revolutionise the identification and treatment of risks in business processes by integrating the latest technologies for risk management and process management. It will provide organisations with a range of new tools and techniques for designing, deploying and monitoring risk-aware business processes.
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
Cost-aware business process management. The project aims to inform business process management (BPM) with the latest insights from the field of management accounting in order to make BPM systems cost-aware. By incorporating the cost dimension, organisations can obtain an accurate and immediate overview of the true cost of their processes and make cost-informed decisions.
Special Research Initiatives - Grant ID: SR0567386
Funder
Australian Research Council
Funding Amount
$98,000.00
Summary
Mechanisms for Ultra-secure Access to Large Repositories of Sensitive Data over the Grid. Large repositories of data that are typically geographically distributed and are subject to varying degrees of legal and ethical constraints are not available for open scientific research due to the sensitive and private nature of the information they contain, e.g. personal health records offer significant value for medical research, but are not readily available due to privacy legislation and the requireme ....Mechanisms for Ultra-secure Access to Large Repositories of Sensitive Data over the Grid. Large repositories of data that are typically geographically distributed and are subject to varying degrees of legal and ethical constraints are not available for open scientific research due to the sensitive and private nature of the information they contain, e.g. personal health records offer significant value for medical research, but are not readily available due to privacy legislation and the requirement to maintain end-user’s trust in healthcare information system. This project will build a demonstrator, based upon advanced cryptographic and information research and technologies to provide ultra-secure and sanitized access to this data via a data network grid.Read moreRead less