A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehens ....Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehensive security policy management framework, designs a distributed authorisation service and demonstrates a practical secure web service system in .NET.It presents a new approach to formally reasoning about conflict resolution policies with dynamic delegation.Read moreRead less
New Mobile Interface Techniques for Accessing Desktop Applications from Mobile Devices. The mobile data industry is a multi-billion dollar industry and is growing at a rate of seventeen percent per year. The capability to access data and applications from handheld devices is becoming increasingly vital for businesses and transforming business practices. However, while there are a multitude of software applications available for use on desktop computers these typically can't be used from mobile d ....New Mobile Interface Techniques for Accessing Desktop Applications from Mobile Devices. The mobile data industry is a multi-billion dollar industry and is growing at a rate of seventeen percent per year. The capability to access data and applications from handheld devices is becoming increasingly vital for businesses and transforming business practices. However, while there are a multitude of software applications available for use on desktop computers these typically can't be used from mobile devices due to the small form factor. In this project we will develop new mobile interface techniques and methodologies that will allow unaltered desktop software applications to be used from small-form factor mobile devices, via transforming the application interfaces.Read moreRead less
Active Management of Complex Non-self-finalising Behaviours through Deep Analytics. This project aims to build theoretical breakthroughs and novel tools for deep analytics and active management of non-self-finalising (NSF) individual and business behaviours, which are sophisticated and increasingly seen in public sectors such as taxation and business including banking and insurance. The challenging economic environment continues to make managing NSF behaviours difficult. To date, there are no su ....Active Management of Complex Non-self-finalising Behaviours through Deep Analytics. This project aims to build theoretical breakthroughs and novel tools for deep analytics and active management of non-self-finalising (NSF) individual and business behaviours, which are sophisticated and increasingly seen in public sectors such as taxation and business including banking and insurance. The challenging economic environment continues to make managing NSF behaviours difficult. To date, there are no sufficient theories or effective systems in data mining and behavioural science to systematically learn the intent, impact and patterns of NSF behaviours, and to suggest cost-effective responses to these behaviours. This project aims to ensure Australia’s leading role in innovation for evidence-driven enterprise behaviour analytics and management.Read moreRead less
Detecting significant changes in organisation-customer interactions leading to non-compliance. The instant detection of risky customer and/or group dynamics and business policy and/or process changes dispersed in normal interactions can avoid immense losses and inconsistent policies for Government and industries, such as preventing Centrelink customer debt. This project will deliver novel analytical techniques and smart information use to effectively detect the above-mentioned changes leading to ....Detecting significant changes in organisation-customer interactions leading to non-compliance. The instant detection of risky customer and/or group dynamics and business policy and/or process changes dispersed in normal interactions can avoid immense losses and inconsistent policies for Government and industries, such as preventing Centrelink customer debt. This project will deliver novel analytical techniques and smart information use to effectively detect the above-mentioned changes leading to non-compliance. It will enhance service quality, compliance, payment accuracy and policy design for the Australian Government and industries such as Centrelink, the Department of Families, Housing, Community Services and Indigenous Affairs (FaHCSIA), banking and insurance. The resulting systems, the researchers trained and resulting publications will significantly enhance Australia's leading role in tackling change-driven non-compliance.Read moreRead less