Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to li ....Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to link related research at UTS and Southampton University to understand how tools might support this knowledge management. Outcomes will include the creation of specific tools (and techniques for using them) within the context of managing organisational uptake of new technologies.Read moreRead less
High-performance real-time OS framework for low-power applications. Wireless network adapters, as they are being developed by Cisco, will find widespread use in the near future, as they are the basis of all mobile or otherwise disconnected intelligent devices. These devices must process data very rapidly, yet operate with minimal power consumption. We will develop operating system kernels that will support the secure, efficient and protected execution of the core processing firmware, and provide ....High-performance real-time OS framework for low-power applications. Wireless network adapters, as they are being developed by Cisco, will find widespread use in the near future, as they are the basis of all mobile or otherwise disconnected intelligent devices. These devices must process data very rapidly, yet operate with minimal power consumption. We will develop operating system kernels that will support the secure, efficient and protected execution of the core processing firmware, and provide application frameworks for the controlling higher software layers. We will also investigate and design hardware mechanisms that support the software while keeping power consumption minimal.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Building correct-by-construction distributed systems from specifications stating how agents' knowledge evolves over time. Many distributed computer system implementations fail to comply with their original informal requirement specification. These requirements typically refer to the migration of information through the system over time, but current specification languages are not rich enough to express such requirements on a sufficiently abstract level. This results in a huge error-provoking gap ....Building correct-by-construction distributed systems from specifications stating how agents' knowledge evolves over time. Many distributed computer system implementations fail to comply with their original informal requirement specification. These requirements typically refer to the migration of information through the system over time, but current specification languages are not rich enough to express such requirements on a sufficiently abstract level. This results in a huge error-provoking gap between the informal requirements and the starting point of formally verifiable development. To minimise this gap, we develop a particularly expressive specification language, a calculus for stepwise refinement from such specifications down to distributed systems, and an automated tool for checking and supporting refinement steps in the calculus.Read moreRead less
Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregati ....Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregation property to make it scalable for the Internet core. Successful outcomes would open the floodgates, allowing the development and deployment of applications such as high quality videoconferences, live sport broadcasts, remote medical services, network games, real-time on-line educations, and multimedia distributions.
Read moreRead less
Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discove ....Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discovery in the network core. The solution allows an integration of both scalability and end-to-end QoS architectures. The outcomes allow network providers to provision network resources efficiently, to develop competitive Internet-based products; and the service providers to develop quality services such as high quality IP phone, multimedia distributions.
Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less
Singular and Analytic Perturbations, Slow and Fast Time Scales in Control Theory and Viability Theory and their Applications. We propose an innovative approach to several important classes of mathematical problems, whose data depend analytically on small perturbation parameters. Time scale problems, and, in particular, the interaction of two types of evolution, slow and fast, arise in many scientific domains (biotechnology, physics, engineering, etc).We expect to develop new techniques for analy ....Singular and Analytic Perturbations, Slow and Fast Time Scales in Control Theory and Viability Theory and their Applications. We propose an innovative approach to several important classes of mathematical problems, whose data depend analytically on small perturbation parameters. Time scale problems, and, in particular, the interaction of two types of evolution, slow and fast, arise in many scientific domains (biotechnology, physics, engineering, etc).We expect to develop new techniques for analysis and asymptotic optimisation of singularly perturbed control systems and Markov decision processes. In particular, we plan to establish links between general nonlinear optimal control problems with time average criteria and linear programming problems in the space of limit occupational measures generated by the underlying control system.Read moreRead less