Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on lang ....Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on languages supported by commercial tools. The outcome will be a framework for comparing the expressiveness of process execution languages and defining mappings between them. This will place Australia at the forefront of developments in business process management systems: a crucial technology in today's global, dynamic, and heterogeneous environments.
Read moreRead less
Personalized, Adaptive, and Semantic-driven Selection and Composition of Web Services. Web services are the pillar of the new generation of Internet technologies. They provide standardized access to functionality that would otherwise be hidden inside enterprise information systems. As the existing base of web services expands, there is a need for techniques to select, configure, assemble, and coordinate web services to perform complex user tasks. This project will advance the fundamental underst ....Personalized, Adaptive, and Semantic-driven Selection and Composition of Web Services. Web services are the pillar of the new generation of Internet technologies. They provide standardized access to functionality that would otherwise be hidden inside enterprise information systems. As the existing base of web services expands, there is a need for techniques to select, configure, assemble, and coordinate web services to perform complex user tasks. This project will advance the fundamental understanding and know-how in this area by addressing three complementary research challenges: how to, organize and search semantically rich service descriptions; select services with respect to flexible and personalized criteria; and coordinate services in an adaptive and context-aware manner.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issue ....Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issues related to fast and scalable composition of e-services in Web-based environments. We propose novel concepts for integrating a large number of dynamic and loosely coupled services. Another distinctive feature of our approach is the peer-to-peer collaborative execution of services.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
A novel Internet-based clinical trial service. The best way to test whether a clinical treatment intervention is effective is a randomised controlled trial (rct). Rcts are expensive, both in terms of resources and time. The internet may provide a method of conducting rcts which is efficent and provides access to those in remote communities. The purpose of this project is to assess the feasibility of developing a structure for conducting rcts using the internet.
Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues ....Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues within these projects and develops improved modelling techniques and project management approaches for large modelling initiatives. The outcomes will streamline the design, integration, maintenance and communication of models with a focus on Enterprise Systems.Read moreRead less
An Organisation Oriented Framework for Collaborative Business Processes. Business integration and enterprise computing is at the heart of ICT objectives and initiatives global wide. The project aims to be of unique value to Australian industry and provide a means to achieve excellence in the field of research that promises to shape the future of e-business technology. The research conducted within this project will position Australia as one of the leaders in the collaborative business process ma ....An Organisation Oriented Framework for Collaborative Business Processes. Business integration and enterprise computing is at the heart of ICT objectives and initiatives global wide. The project aims to be of unique value to Australian industry and provide a means to achieve excellence in the field of research that promises to shape the future of e-business technology. The research conducted within this project will position Australia as one of the leaders in the collaborative business process management area. The project outcomes will provide generic solutions that are applicable to many Australian and international companies involved in B2B collaboration and e-business technologies. Read moreRead less
Design of Service Interfaces for e-Business Applications. Economic pressures are rapidly driving businesses towards automation of e-business (electronic business) transactions. Successful e-business relies on accurate interchange of information among large numbers of autonomous partner organizations with different business semantics. Web services are widely regarded as having the potential to provide a suitable platform for the implementation of e-business applications, however so far only limit ....Design of Service Interfaces for e-Business Applications. Economic pressures are rapidly driving businesses towards automation of e-business (electronic business) transactions. Successful e-business relies on accurate interchange of information among large numbers of autonomous partner organizations with different business semantics. Web services are widely regarded as having the potential to provide a suitable platform for the implementation of e-business applications, however so far only limited attention was paid to Web services design. The aim of this project is to develop a design method suitable for developing a comprehensive and consistent set of Web services for a given application domain and to verify this method using a prototype implementation.Read moreRead less
Reconciling Activity-centric and Business Object-centric Approaches to Business Process Modelling. Business process models are a fundamental instrument for analysing and automating the operations of organisations. At present, the space of business process modelling techniques is characterised by fragmentation with various approaches striking different tradeoffs. Two major families of approaches can be distinguished: activity-centric and business object-centric. These approaches correspond to com ....Reconciling Activity-centric and Business Object-centric Approaches to Business Process Modelling. Business process models are a fundamental instrument for analysing and automating the operations of organisations. At present, the space of business process modelling techniques is characterised by fragmentation with various approaches striking different tradeoffs. Two major families of approaches can be distinguished: activity-centric and business object-centric. These approaches correspond to complementary viewpoints. We see great potential in creating a level of integration between them. Accordingly, the project will investigate the relative expressiveness of these approaches, identify incompatibilities and synergies, and design model transformations. This will establish a foundation for next-generation business process modelling tools.Read moreRead less