Queensland Treasury Corporation

Displaying 1-40 of 120 results

  • White Papers // Mar 2014

    Challenges of Knowledge Integration in Small and Medium Enterprises

    In this paper, the authors attempt to develop a better understanding of the challenges of Knowledge Integration (KI) within the innovation process in Small and Medium Enterprises (SMEs). Using several case studies, this study investigates how knowledge integration may be managed within the context of innovation in SMEs. The paper...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2014

    Intelligent Data Analysis: Issues and Challenges

    Today with the advances of technology, mountainous amounts of data are now available in science, business, industry and many other areas. Evaluation of these collected data may lead to the discovery of trends and patterns hidden within the data that increase the working efficiency and improve the quality of decision...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2013

    Multi-Ciphersuite Security and the SSH Protocol

    Real-world cryptographic protocols, such as the Transport Layer Security (TLS) and Secure SHell (SSH) protocols, support the negotiation of different combinations of cryptographic algorithms, often known as cipher-suites. An individual cipher-suite can be modeled as an Authenticated and Confidential Channel Establishment (ACCE) protocol, and recently all widely deployed TLS cipher-suites...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2013

    Profiling Event Logs to Configure Risk Indicators for Process Delays

    Risk identification is one of the most challenging stages in the risk management process. Conventional risk management approaches provide little guidance and companies often rely on the knowledge of experts for risk identification. In this paper, the authors demonstrate how risk indicators can be used to predict process delays via...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2013

    Slice, Mine and Dice: Complexity-Aware Automated Discovery of Business Process Models

    Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous paper,...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Double-Authentication-Preventing Signatures

    The digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, the certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Usability and Security of Gaze-Based Graphical Grid Passwords

    The authors present and analyze several gaze-based graphical pass-word schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Their 22-subject study ob-serves that success rate and entry time for the grid-based...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Modelling the Contribution of Knowledge Management Towards Achieving Organisational Business Objectives

    Knowledge Management (KM) continues to receive mounting interest within the construction industry due to its potential to offer solutions for organizations seeking competitive advantage. This paper presents a KM input-process output conceptual model comprising unique and well-defined theoretical constructs representing KM practices and their internal and external determinants in the...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Improving Opportunity Recognition and Business Performance in Small and Medium Manufacturing Enterprises Through Design Innovation Programs

    Increasing awareness of the benefits of stimulating entrepreneurial behavior in small and medium enterprises has fostered strong interest in innovation programs. Recently many western countries have invested in design innovation for better firm performance. This research presents some early findings from a study of companies that participated in a holistic...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2013

    A Software Framework for Risk-Aware Business Process Management

    With the large diffusion of Business Process Management (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2013

    What Is the Role of Design-Led Innovation and Design-Led Prototyping in Developing Novel Business Models?

    Recently, 'Business model' and 'Business model innovation' have gained substantial attention in management literature and practice. However, many firms lack the capability to develop a novel business model to capture the value from new technologies. Existing literature on business model innovation highlights the central role of 'Customer value'. Further, it...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2013

    Which Cultural Values Matter to Business Process Management? Results From a Global Delphi Study

    Business Process Management (BPM) requires a holistic perspective that includes managing the culture of an organization to achieve objectives of efficient and effective business processes. Still, the specifics of a BPM-supportive organizational culture have not been examined so far. Thus, the purpose of the authors' paper is to identify the...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    Operational Semantics of Aspects in Business Process Management

    Aspect orientation is an important approach to address complexity of cross-cutting concerns in Information Systems. This approach encapsulates these concerns separately and composes them to the main module when needed. Although there are different works which shows how this separation should be performed in process models, the com-position of them...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    State Convergence in Bit-Based Stream Ciphers

    Modern stream cipher applications use a secret key and a publicly known Initialisation Vector (IV) to form an initial internal state for the key-stream generator, before key-stream generation begins. Well-designed initialization and key-stream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct key-stream. In this...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    A Survey of Trust and Reputation Systems for Online Service Provision

    Trust and reputation systems represent a significant trend in decision support for internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction and use the aggregated ratings about a given party to derive a trust or reputation score,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2013

    Formal Semantics and Analysis of Control Flow in WS-BPEL

    Web service composition refers to the creation of new (Web) services by combination of functionality provided by existing ones. This paradigm has gained significant attention in the Web services community and is seen as a pillar for building service-oriented applications. A number of domain-specific languages for service composition have been...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2012

    Fragment-based Version Management for Repositories of Business Process Models

    As organizations reach higher levels of Business Process Management maturity, they tend to accumulate large collections of process models. These repositories may contain thousands of activities and be managed by different stakeholders with varying skills and responsibilities. However, while being of great value, these repositories induce high management costs. Thus,...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2012

    Public, Private, or Hybrid? What the Upstream Oil & Gas Industry Can Learn From Other Sectors About \"The Cloud\"

    Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges - most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in Information Technology (IT) infrastructure - that make a full migration...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2012

    A Business Model for an Inclusive Entrepreneurial Development

    In 2004 Prahalad made managers aware of the great economic opportunity that the population at the BoP (Base of the Pyramid) represents for business in the form of new potential consumers. However, MNCs (Multi-National Corporations) generally continue to penetrate low income markets with the same strategies used at the top...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2012

    Applying Social Technology to Business Process Lifecycle Management

    In recent years, social technologies such as wikis, blogs or micro-blogging have seen an exponential growth in the uptake of their user base making this type of technology one of the most significant networking and knowledge sharing platforms for potentially hundreds of millions of users. However, the adoption of these...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2012

    Fully Private Revocable Predicate Encryption

    The authors introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Forward-Secure Hierarchical Predicate Encryption

    Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. Forward Security (FS), introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Current Research in Risk-Aware Business Process Management - Overview, Comparison, and Gap Analysis

    The management of risks in business processes has been a subject of active research in the past few years. Many benefits can potentially be obtained by integrating the two traditionally-separated fields of risk management and business process management, including the ability to minimize risks in business processes (by design) and...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Small And Medium Enterprises Sourcing Software As A Service - A Dynamic Perspective On Is Capabilities

    Software as a Service (SaaS) is a promising approach for Small and Medium Enterprises (SMEs) firms, in particular those that are focused on growing fast and leveraging new technology, due to the potential benefits arising from its inherent scalability, reduced total cost of ownership and the ease of access to...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    A Formative Measurement Model of Business Process Model Quality

    Business Process Management (BPM) is becoming the dominant management paradigm. Business process modeling is central to BPM, and the resultant business process model the core artefact guiding subsequent process change. Thus, model quality is at the centre, mediating between the modeling effort and related growing investment in ultimate process improvements....

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Automated Risk Mitigation in Business Processes

    In this paper the authors propose a concrete approach for the automatic mitigation of risks that are detected during process enactment. Given a process model exposed to risks, e.g. a financial process exposed to the risk of approval fraud, the authors enact this process and as soon as the likelihood...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Users' Adoption of Web 2.0 for Knowledge Management: Position Paper

    Web 2.0 is a new generation of online applications on the web that permit people to collaborate and share information online. The use of such applications by employees in organizations enhances Knowledge Management (KM) in organizations. Employee involvement is a critical success factor as the concept is based on openness,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Publicly Verifiable Ciphertexts

    In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gate-way that bridges the two domains and faithfully forwards the incoming traffic to the receiver. The authors observe that INDistinguishability against (adaptive) Chosen-Ciphertext Attacks (IND-CCA), which is a mandatory goal...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Business Process Data Compliance

    Most approaches to business process compliance are restricted to the analysis of the structure of processes. It has been argued that full regulatory compliance requires information on not only the structure of processes but also on what the tasks in a process do. To this end Governatori and Saqid proposed...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Knowledge-Intensive Business Processes

    Contemporary information systems are generally built on the principle of segregation of data and processes. Data are modeled in terms of entities and relationships while processes are modeled as chains of events and activities. This situation engenders an impedance mismatch between the process layer, the business logic layer and the...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    Ergodic Capacity of the Exponentially Correlated Slotted Amplify and Forward Relay Channel

    In this paper, the authors analyze the performance degradation of slotted amplify-and-forward protocol in wireless environments with high node density where the number of relays grows asymptotically large. Channel gains between source-destination pairs in such networks can no longer be independent. They analyze the degradation of performance in such wireless...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    How Do Practitioners Use Conceptual Modelling in Practice?

    Much research has been devoted over the years to investigating and advancing the techniques and tools used by analysts when they model. As opposed to what academics, software providers and their resellers promote as should be happening, the aim of this paper was to determine whether practitioners still embraced conceptual...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2012

    Distributed Process Discovery and Conformance Checking

    Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checking (i.e., comparing modeled...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Enterprise Architecture And The Integration Of Service-Oriented Architecture

    In recent years, Enterprise Architecture (EA) has captured growing attention as a means to systematically consolidate and interrelate diverse business and IT artefacts in order to provide holistic decision support. The recent popularity of a service-orientation has added \"Service\" and related constructs as a new element that requires consideration within...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Where Do We Find Services in Enterprise Architectures? a Comparative Approach

    In recent years, Enterprise Architecture (EA) has captured growing attention as a means to systematically consolidate and interrelate diverse IT artifacts in order to provide holistic decision support. Since the emergence of Service-Oriented Architecture (SOA), many attempts have been made to incorporate SOA artifacts in existing EA frameworks. Yet the...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Towards an Orchestration Theory in Business Transformation Management

    Business transformations are large-scale organizational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. The authors classify management services such as (but not limited to)...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Factors of Process Model Comprehension - Findings from a Series of Experiments

    In order to make good decisions about the design of information systems, an essential skill is to understand process models of the business domain the system is intended to support. Yet, little knowledge to date has been established about the factors that affect how model users comprehend the content of...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Energy-Oriented Design Tools for Collaboration in the Cloud

    Emerging from the challenge to reduce energy consumption in buildings is the need for energy simulation to be used more effectively to support integrated decision making in early design. As a critical response to a Green Star case study, the authors present DEEPA, a parametric modeling framework that enables architects...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2011

    The Scalability and the Strategy for EMR Database Encryption Techniques

    EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Now-a-days, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2011

    Workflow Support for Scheduling in Surgical Care Processes

    Real-world business processes rely on the availability of scarce, shared resources, both human and non-human. Current workflow management systems support allocation of individual human resources to tasks but lack support for the full range of resource types used in practice, and the inevitable constraints on their availability and applicability. Based...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    Ergodic Capacity of the Exponentially Correlated Slotted Amplify and Forward Relay Channel

    In this paper, the authors analyze the performance degradation of slotted amplify-and-forward protocol in wireless environments with high node density where the number of relays grows asymptotically large. Channel gains between source-destination pairs in such networks can no longer be independent. They analyze the degradation of performance in such wireless...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2012

    Fully Private Revocable Predicate Encryption

    The authors introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Forward-Secure Hierarchical Predicate Encryption

    Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. Forward Security (FS), introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Publicly Verifiable Ciphertexts

    In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gate-way that bridges the two domains and faithfully forwards the incoming traffic to the receiver. The authors observe that INDistinguishability against (adaptive) Chosen-Ciphertext Attacks (IND-CCA), which is a mandatory goal...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2010

    Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA

    Wireless Sensor Networks (WSNs) have a devastating security threat: node capture. The threat is so powerful that almost all existing key management protocols are helpless because it overthrows the fundamental assumption for cryptographic system design which long term secret keys are securely stored. This is why so called forward secrecy...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2008

    MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches

    Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2009

    A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

    Process Control Systems (PCSs) or Supervisory Control And Data Acquisition (SCADA) systems have recently been added to the already wide collection of Wireless Sensor Networks applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Small And Medium Enterprises Sourcing Software As A Service - A Dynamic Perspective On Is Capabilities

    Software as a Service (SaaS) is a promising approach for Small and Medium Enterprises (SMEs) firms, in particular those that are focused on growing fast and leveraging new technology, due to the potential benefits arising from its inherent scalability, reduced total cost of ownership and the ease of access to...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    How Do Practitioners Use Conceptual Modelling in Practice?

    Much research has been devoted over the years to investigating and advancing the techniques and tools used by analysts when they model. As opposed to what academics, software providers and their resellers promote as should be happening, the aim of this paper was to determine whether practitioners still embraced conceptual...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Factors of Process Model Comprehension - Findings from a Series of Experiments

    In order to make good decisions about the design of information systems, an essential skill is to understand process models of the business domain the system is intended to support. Yet, little knowledge to date has been established about the factors that affect how model users comprehend the content of...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2011

    Managing Process Model Complexity via Concrete Syntax Modifications

    While Business Process Management (BPM) is an established discipline, the increased adoption of BPM technology in recent years has introduced new challenges. One challenge concerns dealing with the ever-growing complexity of business process models. Mechanisms for dealing with this complexity can be classified into two categories: those that are solely...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2010

    APROMORE: An Advanced Process Model Repository

    Business Process Models are becoming available in large numbers due to their widespread use in many industrial applications such as enterprise and quality engineering projects. On the one hand, this raises a challenge as to their proper management: how can it be ensured that the proper process model is always...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2010

    An Exploratory Study of IT-enabled Collaborative Process Modeling

    Process modeling is an important design practice in intra-as well as inter-organizational process improvement projects. Inter-organizational process modeling often requires collaboration support for distributed participants. The authors present the results of a preliminary exploratory of study of process modeling on basis of collaborative technology. They examine a group of process...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2008

    Beyond Control-Flow: Extending Business Process Configuration to Roles and Objects

    A configurable process model is an integrated representation of multiple variants of a business process. It is designed to be individualized to meet a particular set of requirements. As such, configurable process models promote systematic reuse of proven or common practices. Existing notations for configurable process modeling focus on capturing...

    Provided By Queensland Treasury Corporation

  • White Papers // Sep 2008

    Domain-driven Process Adaptation in Emergency Scenarios

    Business Process Models are a suitable means to describe the temporal and logical order of tasks for achieving a given goal. Therefore they become crucial in the coordination of intervention actions to efficiently recover from a disaster or tragic event. Past experience is vital in handling these scenarios, but every...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2008

    Dimensions of Business Processes Quality (QoBP)

    Conceptual modeling is an important tool for understanding and revealing weaknesses of business processes. Yet, the current practice in reengineering projects often considers simply the as-is process model as a brain-storming tool. This approach heavily relies on the intuition of the participants and misses a clear description of the quality...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2008

    Towards Systematic Usage of Labels and Icons in Business Process Models

    Surprisingly little research has investigated the factors contributing to the successful practice of process modeling, in particular those contributing to the development of process models that facilitate human understanding. This paper discusses the use of text and icons for labeling the graphical constructs in a process model. The authors discuss...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2008

    Advanced Reduction Rules for the Verification of EPC Business Process Models

    Conceptual Business Process Models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is that most of today's commercial business process management tools provide only limited support for quality assurance beyond simple syntax checks. In this paper,...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2008

    The Impact of Activity Labeling Styles on Process Model Quality

    Quality issues and their connection with structural aspects of process models have been recently studied, but there is still a notable lack of research into quality aspects of activity labels in Business Process Models. In this paper, the authors investigate whether the guideline to use verb-object labels actually contributes to...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2008

    Specifying Separation of Duty Constraints in BPEL4People Processes

    Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on open interfaces such as web services. In this paper, the authors examine the new BPEL extension BPEL4People from an access control perspective. In particular, they...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2007

    On the Degree of Behavioral Similarity between Business Process Models

    Quality aspects become increasingly important while business process modeling is used in a large-scale enterprise setting. In order to facilitate storage without redundancy and an efficient retrieval of relevant process models in model databases it is required to develop a theoretical understanding of how a degree of behavioral similarity can...

    Provided By Queensland Treasury Corporation

  • White Papers // Sep 2007

    Understanding the Occurrence of Errors in Process Models based on Metrics

    Business Process Models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice, there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2007

    Adequacy in Process Modeling: A Review of Measures and a Proposed Research Agenda

    Adequacy of process design is closely connected to the notion of process model adequacy, which in turn is a surrogate for model quality. Quality of modeling is an important field of research in which, however, a comprehensive and generally acknowledged understanding is still outstanding. Notions of "Model", "Adequacy" and "Quality"...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2006

    On the Translation between BPMN and BPEL: Conceptual Mismatch between Process Modeling Languages

    Business practice shows that, often, different process models are employed in the various phases of the Business Process Management life cycle, each providing a different paradigm for capturing and representing the business process domain. Recently, significant efforts have been made to overcome the disintegration of process models by providing complementary...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Double-Authentication-Preventing Signatures

    The digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, the certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2009

    Business Process Modeling- A Comparative Analysis

    Many Business Process Modeling techniques have been proposed over the last decades, creating a demand for theory to assist in the comparison and evaluation of these techniques. A widely established way of determining the effectiveness and efficiency of modeling techniques is by way of representational analysis. This paper comparatively assesses...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2011

    Building a Methodology for Context-Aware Business Processes: Insights From an Exploratory Case Study

    In this paper, the authors describe the findings from an exploratory case study into the business processes at a leading Australian insurance provider. The business processes are frequently subjected to changes and deviations due to contextual events such as weather, financial conditions and others. In this paper, they examine how...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    State Convergence in Bit-Based Stream Ciphers

    Modern stream cipher applications use a secret key and a publicly known Initialisation Vector (IV) to form an initial internal state for the key-stream generator, before key-stream generation begins. Well-designed initialization and key-stream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct key-stream. In this...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Automated Risk Mitigation in Business Processes

    In this paper the authors propose a concrete approach for the automatic mitigation of risks that are detected during process enactment. Given a process model exposed to risks, e.g. a financial process exposed to the risk of approval fraud, the authors enact this process and as soon as the likelihood...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2006

    Business Process Modeling: A Maturing Discipline?

    A plethora of Business Process Modeling techniques has been proposed over the last decades, creating a demand for theory to assist in the comparison and evaluation of these techniques. A widely established way of determining the effectiveness and efficiency of modeling techniques is by way of representational analysis. The purpose...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2009

    Context Change Archetypes: Understanding the Impact of Context Change on Business Processes

    The emergence of Enterprise Resource Planning systems and Business Process Management has led to improvements in the design, implementation, and overall management of business processes. However, the typical focus of these initiatives has been on internal business operations, assuming a defined and stable context in which the processes are designed...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2011

    Workflow Support for Scheduling in Surgical Care Processes

    Real-world business processes rely on the availability of scarce, shared resources, both human and non-human. Current workflow management systems support allocation of individual human resources to tasks but lack support for the full range of resource types used in practice, and the inevitable constraints on their availability and applicability. Based...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2008

    Contextualization of Business Processes

    Flexibility has emerged as an important requirement in the design of business processes. Research on process flexibility, however, has traditionally been focused on the intrinsic capability of a process to adapt to a new environment (e.g. workflow escalation, ad-hoc modeling). This paper proposes to extend the existing body of research...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2012

    Distributed Process Discovery and Conformance Checking

    Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checking (i.e., comparing modeled...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2008

    An Update on the Analysis and Design of NMAC and HMAC Functions

    In this paper, the authors investigate the issues in the analysis and design of provably secure Message Authentication Codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by Bellare, Canetti and Krawczyk. First, they provide security analysis of NMAC using weaker assumptions than stated in its proof of...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2008

    Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

    A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-Party Key Exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of Group Key Exchange (GKE) protocols has not been as extensive...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2013

    Multi-Ciphersuite Security and the SSH Protocol

    Real-world cryptographic protocols, such as the Transport Layer Security (TLS) and Secure SHell (SSH) protocols, support the negotiation of different combinations of cryptographic algorithms, often known as cipher-suites. An individual cipher-suite can be modeled as an Authenticated and Confidential Channel Establishment (ACCE) protocol, and recently all widely deployed TLS cipher-suites...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2013

    Profiling Event Logs to Configure Risk Indicators for Process Delays

    Risk identification is one of the most challenging stages in the risk management process. Conventional risk management approaches provide little guidance and companies often rely on the knowledge of experts for risk identification. In this paper, the authors demonstrate how risk indicators can be used to predict process delays via...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Usability and Security of Gaze-Based Graphical Grid Passwords

    The authors present and analyze several gaze-based graphical pass-word schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Their 22-subject study ob-serves that success rate and entry time for the grid-based...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2006

    Enterprise Systems Success: Ameasurement Model

    This paper explains a validated measurement model and instrument for assessing enterprise systems success from multiple perspectives. The final validated study model employs 27 measures of the four dimensions: information quality, system quality, individual impact, and organizational impact. The model is empirically tested with survey data gathered from 27 public...

    Provided By Queensland Treasury Corporation