Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software too ....Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software tools, empowering Australian organisations to utilise the techniques to develop intelligent systems in data sharing environments. These techniques will ultimately lead to better utilisation of the information available in many enterprises and organisations.Read moreRead less
Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a lar ....Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a large variety of problems, but the machinery required was diverse and complicated. This research will organize the machinery into a new approach that systematically finds good algorithms by applying simplifications around a parameter of the domain of the problem. As a result, efficient algorithms are obtained for many diverse areas.Read moreRead less
Benchmarking Information Technology Impact in Organisations. Anecdotal evidence reveals dissatisfaction with the operational performance of large application software systems. Yet, Australian IT investments are seldom systematically evaluated post-implementation. Where post-implementation evaluation does occur, the process and measures are typically idiosyncratic and lacking credibility. The study will: yield a convenient, extensively-validated method for evaluating the impact of IT investments; ....Benchmarking Information Technology Impact in Organisations. Anecdotal evidence reveals dissatisfaction with the operational performance of large application software systems. Yet, Australian IT investments are seldom systematically evaluated post-implementation. Where post-implementation evaluation does occur, the process and measures are typically idiosyncratic and lacking credibility. The study will: yield a convenient, extensively-validated method for evaluating the impact of IT investments; establish comparable IT-Impact benchmarks across different sectors of interest to organisations and Government; and facilitate the education and research training of graduate research students well grounded in IT Evaluation methods, and well placed to advance industry expertise in this area.Read moreRead less