Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to prom ....Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to promote a more informed national conversation about the costs and benefits of Australia's security relationship with the United States of America (USA) and contribute to debates over the future of the Australia-USA Alliance during a period of strategic uncertainty.Read moreRead less
Extended Nuclear Deterrence and the Restraint of Non-Nuclear Allies: Material Cooperation and Strategic Dialogue. Extended nuclear deterrence is central to the security commitments offered by the US to its European and Asian allies, but little is known about why non-nuclear allies ask for the nuclear assurances they do and how they influence the assurances they ultimately receive. Using the lenses of intra-alliance bargaining, the role and composition of assurances, and domestic and internationa ....Extended Nuclear Deterrence and the Restraint of Non-Nuclear Allies: Material Cooperation and Strategic Dialogue. Extended nuclear deterrence is central to the security commitments offered by the US to its European and Asian allies, but little is known about why non-nuclear allies ask for the nuclear assurances they do and how they influence the assurances they ultimately receive. Using the lenses of intra-alliance bargaining, the role and composition of assurances, and domestic and international interactions, the project investigates why non-nuclear allies often seek modest extended nuclear deterrence guarantees when they could push for more ambitious commitments. The outcomes of the project will advance theoretical understanding of alliances, assurance and nuclear strategy, with direct relevance to foreign policy and nuclear disarmament.Read moreRead less
Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection ....Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection mandates on both immediate protection goals and the wider goals of peacekeeping. This project aims to assess the impact of the implementation of mandates to use force to protect civilians. Through a focused comparison of six missions, it plans to identify what works, what doesn't, and the factors which determine these outcomes in order to identify ways of improving performance in the future.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Modelling human decision making in complex environments. The project aims to extend quantitative psychological models of simple choice tasks to decision-making with complex stimuli in complex environments. The new formal models are designed to provide a comprehensive account of behaviour, including the choices that are made, how long it takes to make them, and how choices and choice times vary within and between decision-makers. The models would explain how people adapt to changes in task demand ....Modelling human decision making in complex environments. The project aims to extend quantitative psychological models of simple choice tasks to decision-making with complex stimuli in complex environments. The new formal models are designed to provide a comprehensive account of behaviour, including the choices that are made, how long it takes to make them, and how choices and choice times vary within and between decision-makers. The models would explain how people adapt to changes in task demands when dealing with multiple stimuli or performing multiple tasks concurrently under time pressure. The project aims to provide the basic research that is needed to extend psychological models of choice to complex ‘real-world’ tasks, such air traffic control and maritime surveillance.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Improving the International Response to Regime-Induced Displacement. This project examines why governments increasingly use force to deliberately displace their own populations on a massive scale, which is termed regime-induced displacement. Through a mix of quantitative and case study research, this project aims to explain why such actions have become rational strategies for regimes to respond to ethnic groups which may be a threat to them and how these regimes try to justify their behaviour in ....Improving the International Response to Regime-Induced Displacement. This project examines why governments increasingly use force to deliberately displace their own populations on a massive scale, which is termed regime-induced displacement. Through a mix of quantitative and case study research, this project aims to explain why such actions have become rational strategies for regimes to respond to ethnic groups which may be a threat to them and how these regimes try to justify their behaviour in order to thwart or delay international action. This is a critical issue as beyond its human cost, regime-induced displacement can lead to state fragility and regional instability as cases from Darfur to Syria demonstrate. Consequently, it directly affects Australia's security interests and international responsibilities.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less