Macquarie University

Displaying 1-33 of 33 results

  • White Papers // Mar 2014

    Context-aware Cloud Service Selection based on Comparison and Aggregation of User Subjective Assessment and Objective Performance Assessment

    Due to the diversity and dynamics of cloud services, it is usually hard for potential cloud consumers to select the most suitable cloud service. In prior studies, cloud service selection is usually based on either objective performance assessment or cloud users' subjective assessment (e.g., subjective ratings). However, either assessment way...

    Provided By Macquarie University

  • White Papers // Oct 2013

    Parallel Authenticated Encryption with the Duplex Construction

    The Authentication Encryption (AE) scheme based on the duplex construction cannot be parallelized at the algorithmic level. To be competitive with some block cipher based modes like OCB (O set CodeBook) or GCM (Galois Counter Mode), a scheme should allow parallel processing. In this paper the authors show how parallel...

    Provided By Macquarie University

  • White Papers // Sep 2013

    Preimage Attacks on the Round-Reduced Keccak with the Aid of Differential Cryptanalysis

    In this paper the authors use differential cryptanalysis to attack the winner of the SHA-3 competition, namely keccak hash function. Despite more than 6 years of intensive cryptanalysis, there have been known only two pre-image attacks which reach 3 (or slightly more) rounds. Their 3-round pre-image attack improves the complexity...

    Provided By Macquarie University

  • White Papers // May 2013

    SOAC-Net: A Model to Manage Service-Based Business Process Authorization

    Business Process (BP) can be supported by a large number of resources with evolving contents. In order to receive the support from these resources, the BP must satisfy the authorization policies of these resources. On the other hand, a BP also has its own authorization policies that users must satisfy...

    Provided By Macquarie University

  • White Papers // May 2013

    A Model of Customer Retention of Dissatisfied Business Services Customers

    This paper is to present a theoretical framework of the factors that potentially influence dissatisfied customers to continue purchasing from their existing service provider in the Business-To-Business (B2B) services sector. This paper synthesizes the findings from previous studies on switching barriers, and relationship variables, dependence, and calculative commitment. Five major...

    Provided By Macquarie University

  • White Papers // Apr 2013

    Antivirus Security: Naked During Updates

    The security of modern computer systems heavily depends on security tools, especially on anti-virus software solutions. In the anti-malware research community, development of techniques for evading detection by anti-virus software is an active research area. This has led to malware that can bypass or subvert anti-virus software. The common strategies...

    Provided By Macquarie University

  • White Papers // Apr 2013

    Security Analysis of Linearly Filtered NLFSRs

    The authors' contributions are applying distinguishing attack on linearly filtered NLFSR as a primitive or associated with filter generators. They extend the attack on linear combinations of linearly filtered NLF- SRs as well. Generally, these structures can be examined by the proposed techniques and the criteria will be achieved to...

    Provided By Macquarie University

  • White Papers // Mar 2013

    A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces

    Trustworthy selection of cloud services has become a significant issue in emerging cloud marketplaces. As a consequence, the Cloud Security Alliance (CSA) has formulated a self-assessment framework for cloud providers to publish their cloud platform's security controls and capabilities. This framework enables consumers to select a cloud service based on...

    Provided By Macquarie University

  • White Papers // Feb 2013

    On Malware Characterization and Attack Classification

    Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However, attack techniques such as polymorphism and metamorphism can be used by the attacker to generate multiple variants of the malware and complicate the signature identification....

    Provided By Macquarie University

  • White Papers // Nov 2012

    Does Counting Still Count? Revisiting the Security of Counting Based User Authentication Protocols Against Statistical Attacks

    At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on...

    Provided By Macquarie University

  • White Papers // Sep 2012

    Rotational Cryptanalysis of Round-Reduced KECCAK

    In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. The main motivation behind starting the contest has been the security flaws identified in the SHA-1 standard in 2005. Similarities between SHA-1...

    Provided By Macquarie University

  • White Papers // Aug 2012

    Work Integrated Learning (WIL) in Virtual Reality (VR)

    The ultimate goal of industrialized, developed economies is to increase economic growth and to have a highly-skilled, flexible and responsive workforce in order to remain competitive in an increasingly global economic context. Therefore, there is increasing focus on exploring the various options for optimizing worker training. Apprenticeships, traineeships and internships...

    Provided By Macquarie University

  • White Papers // May 2012

    NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model

    NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized, but until recently, its security analysis relied only on heuristic arguments, which limited the confidence in its security. Recently, this situation has changed, when the authors showed that a slight variant (that they call pNE) could...

    Provided By Macquarie University

  • White Papers // Dec 2011

    Cryptanalysis of WG-7 A Lightweight Stream Cipher for RFID Encryption

    WG-7 is a stream cipher based on WG Stream Cipher and is designed by Y. Luo, Q. Chai, G. Gong, and X. Lai in 2010. This cipher is designed to implement in low cost and lightweight application such as RFID tags. This paper addresses cryptographic weaknesses of WG-7 Stream Cipher....

    Provided By Macquarie University

  • White Papers // Jan 2011

    Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication

    Multicast communication enables a single sender to distribute digital content to a large audience via a public channel such as the Internet. It has applications in sensor networks, pay-TV, air traffic control, stock quotes and military defense systems for instance. Nevertheless, large-scale broadcasts prevent lost content from being redistributed since...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Rateless Codes for the Multicast Stream Authentication Problem

    The authors study the multicast authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. They first study the packet authentication probability of a scheme proposed by Lysyanskaya, Tamassia and Triandopoulos in 2003 since their opponent model is based on theirs. Using a family...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Achieving Multicast Stream Authentication Using MDS Codes

    The authors address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast authentication protocol....

    Provided By Macquarie University

  • White Papers // Jan 2011

    Efficient Multicast Stream Authentication for the Fully Adversarial Network Model

    Broadcast transmission enables a sender to distribute data to many receivers via a public communication channel such as the Internet. Applications cover a large scope of areas such as software updates, sensor networks and GPS signals for instance. Nevertheless, existing Internet IP protocols only provide a best-effort delivery process and...

    Provided By Macquarie University

  • White Papers // Jan 2011

    XQuery as an Annotation Query Language: A Use Case Analysis

    Recent paper has shown that single data model can represent many different kinds of Linguistic annotation. This data model can be expressed equivalently as a directed graph of temporal nodes (Bird and Liberman, Speech Communication, 2000) as a set of intersecting hierarchies (Cassidy and Harrington, Speech Communication, 2000). While some...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Packet Drop Attack: A Serious Threat to Operational Mobile Ad Hoc Networks

    In recent years the widespread availability of wireless communications, mobile computing and handheld devices has led to the growth and significance of wireless mobile ad hoc networks. Security issues are paramount in such networks even more so than in wired networks. Though there have been many works in the recent...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Short Paper: Fellowship in Mobile Ad hoc Networks

    Security issues are paramount in mobile ad hoc networks even more so than in wired networks. Though there have been many works in the recent years on secure routing protocols for mobile ad hoc networks still ad hoc networks are prone to specific attacks such as packet drop attacks. In...

    Provided By Macquarie University

  • White Papers // Sep 2010

    Cryptanalysis of the Convex Hull Click Human Identification Protocol

    Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Equivalence Of IFRS Across Languages: Translation Issues From English To German

    Convergence has been supported by the notion that a single set of high-quality global accounting standards is an important means of enhancing comparability of financial statements. The purpose of this paper is to emphasize translation of International Financial Reporting Standards (IFRS) as an impediment for a consistent application and interpretation...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Rights-Based Accountability: The Right To Water Information

    This paper responds to increasing interest in the intersection between accounting and human rights. Rather than considering disclosures of performance in relation to human rights, the paper explores the notion of access to information constituting a human right. Since human rights have 'Moral force', establishing the provision of environmental information...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Accountability Via Central Database Regimes In The Context Of NSW Political Donations

    The authors examine the extent to which the NSW political finance disclosure regime promotes accountability in order to both improve this case as well as understand how accountability might be realised through a Central Database Regime (CDR). A CDR is system in which organizations report information to a central agency,...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Re-Visiting The Interface Between Race And Accounting: The Case Of Filipino Workers

    The interface of race and accounting in sugar plantations in Hawaii is a subject that is unresolved in Accounting History (Fleischman & Tyson, 2000; 2002; Burrows, 2002). This paper presents previously untapped archival material of Hamakua Milling Company from 1921 to 1939 to shed further light on the 'Dark side...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Contextual Relativity Of The Role Of Accounting In Corporate Governance: Evidence From The Banking Industry In Sri Lanka

    Accounting and corporate governance failures have figured prominently in discussions of the possible causes of bankruptcy of financial institutions in recent times. These discussions suggest that accounting has failed to play an effective role in facilitating good governance of those organizations. Using Ekanayake et al. (2009), this paper argues that...

    Provided By Macquarie University

  • White Papers // May 2010

    Manoeuvring The VFM Auditor Identity Within The State Public Sector In Australia Through Business Planning: The Case Of The Victorian Auditor-Generals Office (VAGO)

    This paper examines how a State Audit Office (SAO) in Australia has developed and moulded, the auditor identity, through the corporate planning and annual planning process, from financial auditor to the Value For Money (VFM) auditor. The research context is the public sector audit transformation process of the Victorian Auditor-General's...

    Provided By Macquarie University

  • White Papers // Sep 2009

    The Global Financial Crisis: System Failure, Great Power Rivalry And Prospects For Structural Change

    Unlike the previous economic crises of the past two decades which have occurred in Asia, Russia, Mexico and Argentina, the present crisis of capital occurred at the centre of the globalized economy: the United States of America. The financial crisis gripping the American heartland may indicate both the end of...

    Provided By Macquarie University

  • White Papers // Jul 2009

    Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to...

    Provided By Macquarie University

  • White Papers // Feb 2009

    BTx-Net: A Token Based Dynamic Model for Supporting Consistent Collaborative Business Transactions

    Business transaction is about coordinating the flow of information among organizations and linking their business processes, associated with the solutions to ensure the eventual generation of the consistent outcomes. One important issue here is how to maintain consistency for each partner in the collaborative business transaction as well as consistency...

    Provided By Macquarie University

  • White Papers // Dec 2008

    Trouble in Florida: The Genesis of Phishing Attacks on Australian Banks

    Off late Phishing of Internet banks is a well know problem and globally is responsible for more than US$3 billion in fraud annually. To date there has been limited research into the individuals and groups responsible for these attacks. Considerable anecdotal evidence exists to suggest that transnational organised crime groups...

    Provided By Macquarie University

  • White Papers // Nov 2008

    Does Organizational Culture Influence CRM Outcomes?

    Customer relationship management (CRM) has received wide acceptance as an important management discipline. In recent years, CRM system implementations have become more commonplace (Butler, 2005) and industry forecasts indicate that worldwide spending on CRM technologies will expand to US$11 billion per annum by 2010 (Band, Leaver, and Rogan, 2007). Bain...

    Provided By Macquarie University

  • White Papers // Dec 2008

    Trouble in Florida: The Genesis of Phishing Attacks on Australian Banks

    Off late Phishing of Internet banks is a well know problem and globally is responsible for more than US$3 billion in fraud annually. To date there has been limited research into the individuals and groups responsible for these attacks. Considerable anecdotal evidence exists to suggest that transnational organised crime groups...

    Provided By Macquarie University

  • White Papers // Nov 2008

    Does Organizational Culture Influence CRM Outcomes?

    Customer relationship management (CRM) has received wide acceptance as an important management discipline. In recent years, CRM system implementations have become more commonplace (Butler, 2005) and industry forecasts indicate that worldwide spending on CRM technologies will expand to US$11 billion per annum by 2010 (Band, Leaver, and Rogan, 2007). Bain...

    Provided By Macquarie University

  • White Papers // Sep 2010

    Cryptanalysis of the Convex Hull Click Human Identification Protocol

    Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Equivalence Of IFRS Across Languages: Translation Issues From English To German

    Convergence has been supported by the notion that a single set of high-quality global accounting standards is an important means of enhancing comparability of financial statements. The purpose of this paper is to emphasize translation of International Financial Reporting Standards (IFRS) as an impediment for a consistent application and interpretation...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Rights-Based Accountability: The Right To Water Information

    This paper responds to increasing interest in the intersection between accounting and human rights. Rather than considering disclosures of performance in relation to human rights, the paper explores the notion of access to information constituting a human right. Since human rights have 'Moral force', establishing the provision of environmental information...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Accountability Via Central Database Regimes In The Context Of NSW Political Donations

    The authors examine the extent to which the NSW political finance disclosure regime promotes accountability in order to both improve this case as well as understand how accountability might be realised through a Central Database Regime (CDR). A CDR is system in which organizations report information to a central agency,...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Re-Visiting The Interface Between Race And Accounting: The Case Of Filipino Workers

    The interface of race and accounting in sugar plantations in Hawaii is a subject that is unresolved in Accounting History (Fleischman & Tyson, 2000; 2002; Burrows, 2002). This paper presents previously untapped archival material of Hamakua Milling Company from 1921 to 1939 to shed further light on the 'Dark side...

    Provided By Macquarie University

  • White Papers // Jul 2010

    Contextual Relativity Of The Role Of Accounting In Corporate Governance: Evidence From The Banking Industry In Sri Lanka

    Accounting and corporate governance failures have figured prominently in discussions of the possible causes of bankruptcy of financial institutions in recent times. These discussions suggest that accounting has failed to play an effective role in facilitating good governance of those organizations. Using Ekanayake et al. (2009), this paper argues that...

    Provided By Macquarie University

  • White Papers // May 2010

    Manoeuvring The VFM Auditor Identity Within The State Public Sector In Australia Through Business Planning: The Case Of The Victorian Auditor-Generals Office (VAGO)

    This paper examines how a State Audit Office (SAO) in Australia has developed and moulded, the auditor identity, through the corporate planning and annual planning process, from financial auditor to the Value For Money (VFM) auditor. The research context is the public sector audit transformation process of the Victorian Auditor-General's...

    Provided By Macquarie University

  • White Papers // Jan 2011

    XQuery as an Annotation Query Language: A Use Case Analysis

    Recent paper has shown that single data model can represent many different kinds of Linguistic annotation. This data model can be expressed equivalently as a directed graph of temporal nodes (Bird and Liberman, Speech Communication, 2000) as a set of intersecting hierarchies (Cassidy and Harrington, Speech Communication, 2000). While some...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Achieving Multicast Stream Authentication Using MDS Codes

    The authors address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast authentication protocol....

    Provided By Macquarie University

  • White Papers // Jan 2011

    Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication

    Multicast communication enables a single sender to distribute digital content to a large audience via a public channel such as the Internet. It has applications in sensor networks, pay-TV, air traffic control, stock quotes and military defense systems for instance. Nevertheless, large-scale broadcasts prevent lost content from being redistributed since...

    Provided By Macquarie University

  • White Papers // Sep 2009

    The Global Financial Crisis: System Failure, Great Power Rivalry And Prospects For Structural Change

    Unlike the previous economic crises of the past two decades which have occurred in Asia, Russia, Mexico and Argentina, the present crisis of capital occurred at the centre of the globalized economy: the United States of America. The financial crisis gripping the American heartland may indicate both the end of...

    Provided By Macquarie University

  • White Papers // Jul 2009

    Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Packet Drop Attack: A Serious Threat to Operational Mobile Ad Hoc Networks

    In recent years the widespread availability of wireless communications, mobile computing and handheld devices has led to the growth and significance of wireless mobile ad hoc networks. Security issues are paramount in such networks even more so than in wired networks. Though there have been many works in the recent...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Short Paper: Fellowship in Mobile Ad hoc Networks

    Security issues are paramount in mobile ad hoc networks even more so than in wired networks. Though there have been many works in the recent years on secure routing protocols for mobile ad hoc networks still ad hoc networks are prone to specific attacks such as packet drop attacks. In...

    Provided By Macquarie University

  • White Papers // Dec 2011

    Cryptanalysis of WG-7 A Lightweight Stream Cipher for RFID Encryption

    WG-7 is a stream cipher based on WG Stream Cipher and is designed by Y. Luo, Q. Chai, G. Gong, and X. Lai in 2010. This cipher is designed to implement in low cost and lightweight application such as RFID tags. This paper addresses cryptographic weaknesses of WG-7 Stream Cipher....

    Provided By Macquarie University

  • White Papers // Jan 2011

    Efficient Multicast Stream Authentication for the Fully Adversarial Network Model

    Broadcast transmission enables a sender to distribute data to many receivers via a public communication channel such as the Internet. Applications cover a large scope of areas such as software updates, sensor networks and GPS signals for instance. Nevertheless, existing Internet IP protocols only provide a best-effort delivery process and...

    Provided By Macquarie University

  • White Papers // Jan 2011

    Rateless Codes for the Multicast Stream Authentication Problem

    The authors study the multicast authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. They first study the packet authentication probability of a scheme proposed by Lysyanskaya, Tamassia and Triandopoulos in 2003 since their opponent model is based on theirs. Using a family...

    Provided By Macquarie University

  • White Papers // Aug 2012

    Work Integrated Learning (WIL) in Virtual Reality (VR)

    The ultimate goal of industrialized, developed economies is to increase economic growth and to have a highly-skilled, flexible and responsive workforce in order to remain competitive in an increasingly global economic context. Therefore, there is increasing focus on exploring the various options for optimizing worker training. Apprenticeships, traineeships and internships...

    Provided By Macquarie University

  • White Papers // Nov 2012

    Does Counting Still Count? Revisiting the Security of Counting Based User Authentication Protocols Against Statistical Attacks

    At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on...

    Provided By Macquarie University

  • White Papers // Sep 2012

    Rotational Cryptanalysis of Round-Reduced KECCAK

    In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. The main motivation behind starting the contest has been the security flaws identified in the SHA-1 standard in 2005. Similarities between SHA-1...

    Provided By Macquarie University

  • White Papers // Feb 2013

    On Malware Characterization and Attack Classification

    Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However, attack techniques such as polymorphism and metamorphism can be used by the attacker to generate multiple variants of the malware and complicate the signature identification....

    Provided By Macquarie University

  • White Papers // Mar 2014

    Context-aware Cloud Service Selection based on Comparison and Aggregation of User Subjective Assessment and Objective Performance Assessment

    Due to the diversity and dynamics of cloud services, it is usually hard for potential cloud consumers to select the most suitable cloud service. In prior studies, cloud service selection is usually based on either objective performance assessment or cloud users' subjective assessment (e.g., subjective ratings). However, either assessment way...

    Provided By Macquarie University

  • White Papers // Apr 2013

    Security Analysis of Linearly Filtered NLFSRs

    The authors' contributions are applying distinguishing attack on linearly filtered NLFSR as a primitive or associated with filter generators. They extend the attack on linear combinations of linearly filtered NLF- SRs as well. Generally, these structures can be examined by the proposed techniques and the criteria will be achieved to...

    Provided By Macquarie University

  • White Papers // Oct 2013

    Parallel Authenticated Encryption with the Duplex Construction

    The Authentication Encryption (AE) scheme based on the duplex construction cannot be parallelized at the algorithmic level. To be competitive with some block cipher based modes like OCB (O set CodeBook) or GCM (Galois Counter Mode), a scheme should allow parallel processing. In this paper the authors show how parallel...

    Provided By Macquarie University

  • White Papers // Sep 2013

    Preimage Attacks on the Round-Reduced Keccak with the Aid of Differential Cryptanalysis

    In this paper the authors use differential cryptanalysis to attack the winner of the SHA-3 competition, namely keccak hash function. Despite more than 6 years of intensive cryptanalysis, there have been known only two pre-image attacks which reach 3 (or slightly more) rounds. Their 3-round pre-image attack improves the complexity...

    Provided By Macquarie University

  • White Papers // May 2012

    NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model

    NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized, but until recently, its security analysis relied only on heuristic arguments, which limited the confidence in its security. Recently, this situation has changed, when the authors showed that a slight variant (that they call pNE) could...

    Provided By Macquarie University

  • White Papers // Mar 2013

    A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces

    Trustworthy selection of cloud services has become a significant issue in emerging cloud marketplaces. As a consequence, the Cloud Security Alliance (CSA) has formulated a self-assessment framework for cloud providers to publish their cloud platform's security controls and capabilities. This framework enables consumers to select a cloud service based on...

    Provided By Macquarie University

  • White Papers // Apr 2013

    Antivirus Security: Naked During Updates

    The security of modern computer systems heavily depends on security tools, especially on anti-virus software solutions. In the anti-malware research community, development of techniques for evading detection by anti-virus software is an active research area. This has led to malware that can bypass or subvert anti-virus software. The common strategies...

    Provided By Macquarie University

  • White Papers // Feb 2009

    BTx-Net: A Token Based Dynamic Model for Supporting Consistent Collaborative Business Transactions

    Business transaction is about coordinating the flow of information among organizations and linking their business processes, associated with the solutions to ensure the eventual generation of the consistent outcomes. One important issue here is how to maintain consistency for each partner in the collaborative business transaction as well as consistency...

    Provided By Macquarie University

  • White Papers // May 2013

    SOAC-Net: A Model to Manage Service-Based Business Process Authorization

    Business Process (BP) can be supported by a large number of resources with evolving contents. In order to receive the support from these resources, the BP must satisfy the authorization policies of these resources. On the other hand, a BP also has its own authorization policies that users must satisfy...

    Provided By Macquarie University

  • White Papers // May 2013

    A Model of Customer Retention of Dissatisfied Business Services Customers

    This paper is to present a theoretical framework of the factors that potentially influence dissatisfied customers to continue purchasing from their existing service provider in the Business-To-Business (B2B) services sector. This paper synthesizes the findings from previous studies on switching barriers, and relationship variables, dependence, and calculative commitment. Five major...

    Provided By Macquarie University