Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
A Grid based platform for multi-scaled biological simulation. Heart disease currently affects over 3.5 million Australians. In 2006 it claimed the lives of almost 46,000 Australians (34% of all deaths). We will develop enabling technology that underpins cardiac disease research, offering potential for new treatments and pharmaceutical therapies. Even a small improvement in this area can translate into significant national benefit. Further, the mathematical techniques and software tools we will d ....A Grid based platform for multi-scaled biological simulation. Heart disease currently affects over 3.5 million Australians. In 2006 it claimed the lives of almost 46,000 Australians (34% of all deaths). We will develop enabling technology that underpins cardiac disease research, offering potential for new treatments and pharmaceutical therapies. Even a small improvement in this area can translate into significant national benefit. Further, the mathematical techniques and software tools we will develop, whilst focused on heart tissue, will have broader applicability, and may underpin advancements in other disciplines. Finally, we expect that the software solutions and infrastructure will have both commercial and strategic value in their own right.Read moreRead less
Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a lar ....Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a large variety of problems, but the machinery required was diverse and complicated. This research will organize the machinery into a new approach that systematically finds good algorithms by applying simplifications around a parameter of the domain of the problem. As a result, efficient algorithms are obtained for many diverse areas.Read moreRead less
Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcom ....Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcomes include the ability to ingest multiple video feeds into a dense and dynamic 3D reconstruction for knowledge representation and discovery, and analysis of events and behaviour through new spatio-temporal analytic approaches. This will offer significant benefits for video forensic analysis, policing, and emergency response.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software too ....Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software tools, empowering Australian organisations to utilise the techniques to develop intelligent systems in data sharing environments. These techniques will ultimately lead to better utilisation of the information available in many enterprises and organisations.Read moreRead less
Symbolic synthesis of knowledge-based program implementations. Systems with concurrent streams of activity are ubiquitous in computer hardware and software designs, but are conceptually complex, and fraught with faults and inefficiency. The project aims to address these difficulties by automating aspects of system design, to relieve the designer of the need to reason about complex patterns of information flow.
Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show h ....Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show how to design context-aware systems that are usable and whose autonomic decisions can be trusted. Additional benefits include increased scientific competitiveness of Australia, strengthened collaboration with international research institutions, and high quality graduates (PhDs, Masters, Honours).Read moreRead less