Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Security for Mobile Agent Based Systems. Mobile agents are emerging to be a significant technology in networked computing and pose fundamental challenges in security, for which no suitable solutions exist today. This research project addresses the theory, architecture and design of secure mobile agent systems. It achieves key conceptual advances by proposing a comprehensive security mode and a novel computational trust model for mobile agents. It develops new schemes for dynamic privilege man ....Security for Mobile Agent Based Systems. Mobile agents are emerging to be a significant technology in networked computing and pose fundamental challenges in security, for which no suitable solutions exist today. This research project addresses the theory, architecture and design of secure mobile agent systems. It achieves key conceptual advances by proposing a comprehensive security mode and a novel computational trust model for mobile agents. It develops new schemes for dynamic privilege management and offers new insights into the open research problem of protection against malicious hosts. It considers a novel calculus to formally reason about security properties and demonstrates practical secure agent based Internet applications.Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes ....Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in novel policy based secure and trusted system models and new techniques for malicious attacks detection, which will help to achieve secure Internet applications and large scale systems in Grid computing and e-Science.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less
Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the mod ....Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the model, In particular, the project plans to investigate flexible social network query methods to make users’ event search easy. Finally the project plans to build an evaluation system to demonstrate the efficiency of the algorithms and effectiveness of the model.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less