Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linea ....Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linear scaling electronic structure codes, methods that are critical to the study of nano- and bio-materials, and are therefore of great importance to our economic future and medical well being. The project will build expertise within Australia in the area of interval arithmetic, an area that is currently poorly represented.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Austr ....Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which has been recognised by increased government funding levels. The resulting applications of this project will place Australia as the first country able to design and implement a secure EHR system.Read moreRead less