Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehens ....Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehensive security policy management framework, designs a distributed authorisation service and demonstrates a practical secure web service system in .NET.It presents a new approach to formally reasoning about conflict resolution policies with dynamic delegation.Read moreRead less
Model-Based Approach to Adaptive Channel Coding and Estimation for Future Wireless Communication Systems. The project aims to maximise capacity, data rate and user mobility in wireless communication systems and will advance Australia's fundamental knowledge base in this field so that it stays at the forefront of international research in mobile communications. The application of research outcomes by the Australian telecommunications industry will improve the extent and quality of mobile networks ....Model-Based Approach to Adaptive Channel Coding and Estimation for Future Wireless Communication Systems. The project aims to maximise capacity, data rate and user mobility in wireless communication systems and will advance Australia's fundamental knowledge base in this field so that it stays at the forefront of international research in mobile communications. The application of research outcomes by the Australian telecommunications industry will improve the extent and quality of mobile networks, increasing network capacity and the number of mobile phone subscribers in Australia. This project will also optimise the use of mobile network resources (such as bandwidth and power) in next generation mobile networks, which in turn will result in faster and more reliable services such as wireless Internet access for business and private use.Read moreRead less
Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less