Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE140100061
Funder
Australian Research Council
Funding Amount
$1,000,000.00
Summary
FlashLite: A High Performance Machine for Data Intensive Science. FlashLite: a high performance machine for data intensive science: The 21st century has been described as the century of data. Experts predict an exponential growth in the amount of data that will be captured, generated and archived. Australia has made significant progress towards addressing some of the opportunities and infrastructure challenges posed by such rapid increase in data volumes. However, these investments do not addre ....FlashLite: A High Performance Machine for Data Intensive Science. FlashLite: a high performance machine for data intensive science: The 21st century has been described as the century of data. Experts predict an exponential growth in the amount of data that will be captured, generated and archived. Australia has made significant progress towards addressing some of the opportunities and infrastructure challenges posed by such rapid increase in data volumes. However, these investments do not address the growing need to process data. Conventional supercomputers are unable to meet the challenges of the data explosion. The large gap in latency and bandwidth between the processor, memory and disk subsystems means that the processor is often idle waiting to fetch data. This project will build a platform focussed on data intensive science.Read moreRead less
Sociophysical Interactions: understanding the role of social and tangible technologies in maintaining good habits into old age. How can technology help us 'age well'? The project will study, design and evaluate novel information systems that integrate and support social engagement and physical activity in order to build foundational knowledge about these technologies and maintain the opportunities for social engagement and physical activity in our ageing population.
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less
Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Au ....Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Australian public sector. By identifying and promoting current best practice in workplace responses to public interest whistleblowing, the project will use the experience and perceptions of internal witnesses and first- and second-level managers to identify more routine strategies for preventing, reducing and addressing reprisals and other whistleblowing-related conflicts.Read moreRead less
Printable technologies for high security documents and consumer products. Printable technologies for high security documents and consumer products. This project aims to develop two next-generation printable security feature technologies to protect users from counterfeiting, which costs the world economy billions in lost revenue and undermines the security of citizens. First, it aims to enhance the security of banknotes by developing printable active device patches with energy harvesting flexible ....Printable technologies for high security documents and consumer products. Printable technologies for high security documents and consumer products. This project aims to develop two next-generation printable security feature technologies to protect users from counterfeiting, which costs the world economy billions in lost revenue and undermines the security of citizens. First, it aims to enhance the security of banknotes by developing printable active device patches with energy harvesting flexible polymers as a power source and thin film graphene/polymer nanomaterial as an electrode/energy storage media. Second, it aims to design invisible carbon nanotube inks for optical authentication via near infrared activation. Both technologies are expected to thwart sophisticated counterfeits, particularly those supported by organised crime.Read moreRead less