Case Study

Automatic tracking of access privileges

Staff in large organisations often need standing authorisations to access sensitive information. But when they leave or change roles, IT administrators do not always know to revoke access. Our researchers are developing automated tools to revoke access, which will protect sensitive information.

Acknowledgement of Country

We acknowledge the many Traditional Custodians of Country throughout Australia and honour their Elders past and present.

We respect their deep enduring connection to their lands, waterways and surrounding clan groups since time immemorial. We cherish the richness of First Nations Peoples’ artistic and cultural expressions.

We are privileged to gather on this Country and through this website to share knowledge with future generations.