Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
Opinion Analysis on Objects in Social Networks. This project seeks to provide a new integrated interactive data mining approach to analysing opinions on social networks, enabling organisations and individuals to make informed decisions based on qualitative as well as quantitative analysis. Social networks are fast becoming an important platform for understanding social opinions about events, organisations, products or services. Through an interactive analysis of social opinion, people can make b ....Opinion Analysis on Objects in Social Networks. This project seeks to provide a new integrated interactive data mining approach to analysing opinions on social networks, enabling organisations and individuals to make informed decisions based on qualitative as well as quantitative analysis. Social networks are fast becoming an important platform for understanding social opinions about events, organisations, products or services. Through an interactive analysis of social opinion, people can make better decisions. An ‘object’ in social networks refers to anything people talk about. This project aims to design and implement new social media mining algorithms to analyse the opinions that people express about such objects in terms of who, what, when and where.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to con ....Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to considerably higher cost effectiveness in the emerging mobile Internet.Read moreRead less
Strategic evaluation model for business-to-business electronic marketplace participation. Striving to become a knowledge-based nation is dependent upon the effective adoption, diffusion and implementation of ICT throughout the business community. The developing world markets, brought about by e-commerce and the increased ability to trade globally facilitated by e-markets, have created significant opportunities for Australian organisations. This research will produce a dynamic model that can be ....Strategic evaluation model for business-to-business electronic marketplace participation. Striving to become a knowledge-based nation is dependent upon the effective adoption, diffusion and implementation of ICT throughout the business community. The developing world markets, brought about by e-commerce and the increased ability to trade globally facilitated by e-markets, have created significant opportunities for Australian organisations. This research will produce a dynamic model that can be used to not only evaluate e-marketplace participation but a wide range of Internet applications. The research will provide Australian managers with the foundation of knowledge needed to guide and support their decision-making when implementing new technology.Read moreRead less
Dynamic Life Cycle Evaluation of Customer Relationship Management Systems. Striving to become a knowledge based nation is dependent upon effective adoption, diffusion and implementation of information and communication technology thoughout the business community. This research will produce a dynamic model that can be used to evaluate enterprise wide applications such as electronic Customer Relationship Management (CRM) so that managers can examine the impact of new tehnology on business processe ....Dynamic Life Cycle Evaluation of Customer Relationship Management Systems. Striving to become a knowledge based nation is dependent upon effective adoption, diffusion and implementation of information and communication technology thoughout the business community. This research will produce a dynamic model that can be used to evaluate enterprise wide applications such as electronic Customer Relationship Management (CRM) so that managers can examine the impact of new tehnology on business processes. In addition, the research will provide managers wit the foundation of knowledge needed to guide and support their decision-making when implementing new technology. Read moreRead less
Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of saf ....Formally-Based Security Evaluation Procedures. Guaranteeing information security is of critical national importance, especially in the current political climate. Devices intended to safeguard Australia's electronic communications must be proven secure using leading-edge techniques. Currently, evaluation of such devices relies on informal procedures and the experience of individuals. This project will introduce more rigour into security evaluations by adapting techniques from the fields of safety analysis and formal methods. In particular, mathematical concepts will be introduced using notations suitable for use by security personnel with no prior formal methods experience. The outcomes of this project will enable more efficient and effective information security evaluations.Read moreRead less