Overcoming barriers to effective Internet use by community sector organisations. Providing adequate Internet access for rural and regional Australia is an important priority for governments at all levels. For communities in these areas to benefit from the information economy and realise a continuing improvement in their social, economic and environmental wellbeing, such access must be both affordable and sustainable. Community organisations make an important contribution in these areas and this ....Overcoming barriers to effective Internet use by community sector organisations. Providing adequate Internet access for rural and regional Australia is an important priority for governments at all levels. For communities in these areas to benefit from the information economy and realise a continuing improvement in their social, economic and environmental wellbeing, such access must be both affordable and sustainable. Community organisations make an important contribution in these areas and this research will examine the questions how they adopt such innovations, and how they make use of the Internet to further interaction with their community. It will identify and examine barriers to such use, relating the barriers to both their root causes and the benefits / behaviour on which they impact.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools ....Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools to facilitate government, companies, individuals, and organisations to enhance their information gathering and privacy-preserving capabilities. This is expected to enhance the credibility of the government and organisations and save the possible financial loss of companies and individuals.Read moreRead less
Development of a novel photonic reticulation system for cost efficient delivery of high bandwidth communication services to regional communities. The R&D and commercialisation of the DWDM-lite will have a significant impact on the efficiency of Australia's telecommunications industry with consequent flow-on effects to the productivity and competitiveness of Australian telecommunications industry. The availability of broadband telecommunications services to regional communities at service and ser ....Development of a novel photonic reticulation system for cost efficient delivery of high bandwidth communication services to regional communities. The R&D and commercialisation of the DWDM-lite will have a significant impact on the efficiency of Australia's telecommunications industry with consequent flow-on effects to the productivity and competitiveness of Australian telecommunications industry. The availability of broadband telecommunications services to regional communities at service and services levels to those of metropolitan customers is a recognised national priority. It lies at the core of the Australian Government's recently announced Connect Australia plan directing at regional community benefits in improved availability and affordability of broadband telecommunications services. The product will enhance Australian participation in the global equipment supply industryRead moreRead less
Special Research Initiatives - Grant ID: SR0354476
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian ....Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian government and industry that provide and make smart use of information available on the Web. It will ensure Australian preparedness for the next-generation web technology.Read moreRead less
Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf ....Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.Read moreRead less
Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communic ....Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communication and providing accesses to group members for many database systems. The approach leads to a great understanding of advocating selective information sharing in role-based systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aim ....Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aims to develop techniques for purpose-based usage control and detecting possible conflicts between obligations. The approach leads to a great understanding of advocating limited disclosure in usage control systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less