Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communic ....Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communication and providing accesses to group members for many database systems. The approach leads to a great understanding of advocating selective information sharing in role-based systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aim ....Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aims to develop techniques for purpose-based usage control and detecting possible conflicts between obligations. The approach leads to a great understanding of advocating limited disclosure in usage control systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings a ....Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings and its dependencies with social relations. They can greatly contribute to breakthrough techniques enabling trust-oriented social network analysis and more objective trust management systems that can be transferred to the Australian IT industry to promote the trustworthiness of Web services and reduce monetary loss.Read moreRead less
Improving Modern Programming Language Performance: A Memory-Conscious Approach. The performance of modern programming languages such as Java and C# lags that of imperative languages such as C and Fortran. A significant source of the performance gap is poor memory behavior, which future computer architectures will exacerbate. This project addresses the problem of poor memory behavior in modern programming languages such as Java and C# through an integrated attack that incorporates new garbage c ....Improving Modern Programming Language Performance: A Memory-Conscious Approach. The performance of modern programming languages such as Java and C# lags that of imperative languages such as C and Fortran. A significant source of the performance gap is poor memory behavior, which future computer architectures will exacerbate. This project addresses the problem of poor memory behavior in modern programming languages such as Java and C# through an integrated attack that incorporates new garbage collection algorithms, run-time techniques that optimize running programs, and new compiler analyses with both static and dynamic optimizations. The project will give Australia an
international presence in a research area of great academic and commercial importance.
Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes ....Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in novel policy based secure and trusted system models and new techniques for malicious attacks detection, which will help to achieve secure Internet applications and large scale systems in Grid computing and e-Science.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less