University of Haifa

Displaying 1-22 of 22 results

  • White Papers // Jul 2013

    Cloud Transition for QoS Modeling of Inter-Organizational Workflows

    Complex workflow tasks need in some cases to be mapped to distributed resources and involves the cooperation between several partners. Workflow management is critical to a successful long-term cloud computing strategy. The notion of inter-organizational workflow still needs conceptual and technical support especially in complex and dynamic environments like clouds....

    Provided By University of Haifa

  • White Papers // Jun 2013

    Towards a Concept for Integrating IT Innovation Management into Business IT Management

    Recognizing and utilizing IT innovations are essential activities to maintain and strengthen the competitiveness of companies. The IT in companies has the opportunity to change its own role towards a business enabler and driver by establishing a systematic IT innovation management. Existing frameworks and models for IT governance and IT...

    Provided By University of Haifa

  • White Papers // Apr 2013

    Enriching Process Models for Business Process Compliance Checking in ERP Environments

    In Enterprise Resource Planning (ERP) environments the audit of business process compliance is a complex task as audit relevant context information about the ERP system like Application Controls (ACs) need to be considered to derive comprehensive audit results. Current compliance checking approaches neglect such information as it is not readily...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Jadex WfMS: Distributed Workflow Management for Private Clouds

    Structuring an organization around its business processes has many benefits for both the processes themselves as well as the workflow and business process management within an organization in general. However, there are many challenges that make such a transition from a classical hierarchic to a state-of-the-art process organization difficult. In...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Web 2.0 Artifacts in SME-Networks - A Qualitative Approach Towards an Integrative Conceptualization Considering Organizational and Technical Perspectives

    Small and Medium-sized Enterprises (SMEs) face new challenges in a complex and dynamic competitive environment. According to this, SMEs need to cooperate due to their restricted resources and limited capacities. At this, Enterprise 2.0 is seen as a supporting approach. As there is a lack of academic publications concerning recommendations...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Ad-hoc Management Capabilities for Distributed Business Processes

    Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator's direct sphere of influence - while management requires both monitoring as well as instant reaction capabilities anytime during the overall execution of the process. However, realizing such functions is...

    Provided By University of Haifa

  • White Papers // Aug 2012

    Monitoring BPMN-Processes with Rules in a Distributed Environment

    In this paper, the authors demonstrate an application of rules in a business process scenario. As business processes, they consider data-intensive applications which need to move huge data files from server to server. By using the Business Process Model and Notation (BPMN) in their application, they enable clearly and hierarchically...

    Provided By University of Haifa

  • White Papers // Feb 2012

    Parallelizing Message Schedules to Accelerate the Computations of Hash Functions

    This paper describes an algorithm for accelerating the computations of Davies-Meyer based hash functions. It is based on parallelizing the computation of several message schedules for several message blocks of a given message. This parallelization, together with the proper use of vector processor instructions (SIMD) improves the overall algorithm's performance....

    Provided By University of Haifa

  • White Papers // Nov 2011

    New Attacks on Keccak-224 and Keccak-256

    The Keccak hash function is one of the five finalists in NIST's SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: after several years of cryptanalysis and a lot of effort, the largest number of Keccak rounds for which actual collisions were found was only...

    Provided By University of Haifa

  • White Papers // Jun 2011

    Efficient Software Implementations of Modular Exponentiation

    RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. The authors concentrate here on 512-bit modular exponentiation, used for 1024-bit RSA. They propose optimizations in two directions. At the primitives' level, they...

    Provided By University of Haifa

  • White Papers // Jan 2011

    Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering

    Privacy is an important challenge facing the growth of the Web and the propagation of various transaction models supported by it. Decentralized distributed models of computing are used to mitigate privacy breaches by eliminating a single point of failure. However, end-users can still be attacked in order to discover their...

    Provided By University of Haifa

  • White Papers // Jan 2011

    Producing Scheduling That Causes Concurrent Programs to Fail

    A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manifest itself. This work explores the theory and practice of choosing where in the program to induce such thread switches at runtime....

    Provided By University of Haifa

  • White Papers // Nov 2010

    SHA-512/256

    With the emergence of pervasive 64 bit computing the authors observe that it is more cost effective to compute a SHA-512 than it is to compute a SHA-256 over a given size of data. They propose a standard way to use SHA-512 and truncate its output to 256 bits. For...

    Provided By University of Haifa

  • White Papers // Sep 2010

    Insulation Impossible: Monetary Policy And Regional Fiscal Spillovers In A Federation

    This paper studies the interactions of fiscal and monetary policies in the presence of fiscal spillovers within a monetary union. When capital markets are integrated, the fiscal policy of any member country will influence equilibrium wages and interest rates across the whole union. Thus there are fiscal spillovers within a...

    Provided By University of Haifa

  • White Papers // Aug 2010

    The Antecedents And Consequences Of Conflicts In International Distribution Networks: A Case Study Of Slovenian Largest Exporters

    The purpose of this paper is to study and evaluate exporters' task and emotional conflicts with international distribution channels, as well as their antecedents and export performance consequences. The authors use an interactive approach to explain the role, importance and type of long-term exchange relations between organizations. Channel conflict, dependence,...

    Provided By University of Haifa

  • White Papers // Jun 2010

    Oblivious RAM Revisited

    The need to enhance the security of data storage systems and to encrypt the content they store is obvious. Various encryption algorithms are in common use for many years, so content-encryption may be considered, for the most part, as an already-solved issue. Apparently, encryption alone does not suffice. A server,...

    Provided By University of Haifa

  • White Papers // Jan 2010

    Path Layout on Tree Networks: Bounds in Different Label Switching Models

    Path Layout is a fundamental graph problem in label switching protocols. This problem is raised in various protocols such as the traditional ATM protocol and MPLS which is a new label switching protocol standardized recently by the IETF. Path layout is essentially the problem of reducing the size of the...

    Provided By University of Haifa

  • White Papers // Mar 2009

    Evaluating P2PSIP Under Attack: An Emulative Study

    Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP and technically based on a Distributed Hash Table (DHT). P2P networks are advantageous with respect to reliability and scalability. However, securing DHTs against...

    Provided By University of Haifa

  • White Papers // Jan 2009

    Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    The authors propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their...

    Provided By University of Haifa

  • White Papers // Jun 2008

    One Stop eGovernment for Small and Medium-Sized Enterprises (SME): A Strategic Approach and Case Study to Implement the EU Services Directive

    In view of EU services directive, providers of public services are required to reengineer their product and process organization. Of the underlying information systems and the IT infrastructure this has direct influence on the organization. The fundamental requirements include the establishment of points of single contact for enterprises and the...

    Provided By University of Haifa

  • White Papers // May 2008

    Collaborative e-Business Process Modelling: A Holistic Analysis Framework Focused on Small and Medium-Sized Enterprises

    In this paper, the authors propose a holistic analysis framework for collaborative e-Business process modeling approaches that takes into account the specific challenges Small and Medium-sized Enterprises (SME) are facing with regard to modeling inter-organizational processes. Based on concepts of the management approach Balanced ScoreCard (BSC) four different perspectives are...

    Provided By University of Haifa

  • White Papers // Jan 2007

    Advances in Smart Cards

    Smart card technology has evolved a long way since the idea of using plastic cards to carry microelectronic chips was patented back in 1968 by Dethloff and Grotrupp. Since the turn of the century, smart card technology has pushed its borders both on the high end to integrate new functionalities...

    Provided By University of Haifa

  • White Papers // Nov 2011

    New Attacks on Keccak-224 and Keccak-256

    The Keccak hash function is one of the five finalists in NIST's SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: after several years of cryptanalysis and a lot of effort, the largest number of Keccak rounds for which actual collisions were found was only...

    Provided By University of Haifa

  • White Papers // Feb 2012

    Parallelizing Message Schedules to Accelerate the Computations of Hash Functions

    This paper describes an algorithm for accelerating the computations of Davies-Meyer based hash functions. It is based on parallelizing the computation of several message schedules for several message blocks of a given message. This parallelization, together with the proper use of vector processor instructions (SIMD) improves the overall algorithm's performance....

    Provided By University of Haifa

  • White Papers // Mar 2009

    Evaluating P2PSIP Under Attack: An Emulative Study

    Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP and technically based on a Distributed Hash Table (DHT). P2P networks are advantageous with respect to reliability and scalability. However, securing DHTs against...

    Provided By University of Haifa

  • White Papers // Jun 2013

    Towards a Concept for Integrating IT Innovation Management into Business IT Management

    Recognizing and utilizing IT innovations are essential activities to maintain and strengthen the competitiveness of companies. The IT in companies has the opportunity to change its own role towards a business enabler and driver by establishing a systematic IT innovation management. Existing frameworks and models for IT governance and IT...

    Provided By University of Haifa

  • White Papers // Jan 2010

    Path Layout on Tree Networks: Bounds in Different Label Switching Models

    Path Layout is a fundamental graph problem in label switching protocols. This problem is raised in various protocols such as the traditional ATM protocol and MPLS which is a new label switching protocol standardized recently by the IETF. Path layout is essentially the problem of reducing the size of the...

    Provided By University of Haifa

  • White Papers // Jun 2010

    Oblivious RAM Revisited

    The need to enhance the security of data storage systems and to encrypt the content they store is obvious. Various encryption algorithms are in common use for many years, so content-encryption may be considered, for the most part, as an already-solved issue. Apparently, encryption alone does not suffice. A server,...

    Provided By University of Haifa

  • White Papers // Jan 2009

    Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    The authors propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their...

    Provided By University of Haifa

  • White Papers // Nov 2010

    SHA-512/256

    With the emergence of pervasive 64 bit computing the authors observe that it is more cost effective to compute a SHA-512 than it is to compute a SHA-256 over a given size of data. They propose a standard way to use SHA-512 and truncate its output to 256 bits. For...

    Provided By University of Haifa

  • White Papers // Jan 2011

    Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering

    Privacy is an important challenge facing the growth of the Web and the propagation of various transaction models supported by it. Decentralized distributed models of computing are used to mitigate privacy breaches by eliminating a single point of failure. However, end-users can still be attacked in order to discover their...

    Provided By University of Haifa

  • White Papers // Aug 2010

    The Antecedents And Consequences Of Conflicts In International Distribution Networks: A Case Study Of Slovenian Largest Exporters

    The purpose of this paper is to study and evaluate exporters' task and emotional conflicts with international distribution channels, as well as their antecedents and export performance consequences. The authors use an interactive approach to explain the role, importance and type of long-term exchange relations between organizations. Channel conflict, dependence,...

    Provided By University of Haifa

  • White Papers // Jan 2011

    Producing Scheduling That Causes Concurrent Programs to Fail

    A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manifest itself. This work explores the theory and practice of choosing where in the program to induce such thread switches at runtime....

    Provided By University of Haifa

  • White Papers // Jun 2011

    Efficient Software Implementations of Modular Exponentiation

    RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. The authors concentrate here on 512-bit modular exponentiation, used for 1024-bit RSA. They propose optimizations in two directions. At the primitives' level, they...

    Provided By University of Haifa

  • White Papers // Sep 2010

    Insulation Impossible: Monetary Policy And Regional Fiscal Spillovers In A Federation

    This paper studies the interactions of fiscal and monetary policies in the presence of fiscal spillovers within a monetary union. When capital markets are integrated, the fiscal policy of any member country will influence equilibrium wages and interest rates across the whole union. Thus there are fiscal spillovers within a...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Jadex WfMS: Distributed Workflow Management for Private Clouds

    Structuring an organization around its business processes has many benefits for both the processes themselves as well as the workflow and business process management within an organization in general. However, there are many challenges that make such a transition from a classical hierarchic to a state-of-the-art process organization difficult. In...

    Provided By University of Haifa

  • White Papers // Jul 2013

    Cloud Transition for QoS Modeling of Inter-Organizational Workflows

    Complex workflow tasks need in some cases to be mapped to distributed resources and involves the cooperation between several partners. Workflow management is critical to a successful long-term cloud computing strategy. The notion of inter-organizational workflow still needs conceptual and technical support especially in complex and dynamic environments like clouds....

    Provided By University of Haifa

  • White Papers // Jan 2007

    Advances in Smart Cards

    Smart card technology has evolved a long way since the idea of using plastic cards to carry microelectronic chips was patented back in 1968 by Dethloff and Grotrupp. Since the turn of the century, smart card technology has pushed its borders both on the high end to integrate new functionalities...

    Provided By University of Haifa

  • White Papers // Apr 2013

    Enriching Process Models for Business Process Compliance Checking in ERP Environments

    In Enterprise Resource Planning (ERP) environments the audit of business process compliance is a complex task as audit relevant context information about the ERP system like Application Controls (ACs) need to be considered to derive comprehensive audit results. Current compliance checking approaches neglect such information as it is not readily...

    Provided By University of Haifa

  • White Papers // Aug 2012

    Monitoring BPMN-Processes with Rules in a Distributed Environment

    In this paper, the authors demonstrate an application of rules in a business process scenario. As business processes, they consider data-intensive applications which need to move huge data files from server to server. By using the Business Process Model and Notation (BPMN) in their application, they enable clearly and hierarchically...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Web 2.0 Artifacts in SME-Networks - A Qualitative Approach Towards an Integrative Conceptualization Considering Organizational and Technical Perspectives

    Small and Medium-sized Enterprises (SMEs) face new challenges in a complex and dynamic competitive environment. According to this, SMEs need to cooperate due to their restricted resources and limited capacities. At this, Enterprise 2.0 is seen as a supporting approach. As there is a lack of academic publications concerning recommendations...

    Provided By University of Haifa

  • White Papers // Jan 2013

    Ad-hoc Management Capabilities for Distributed Business Processes

    Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator's direct sphere of influence - while management requires both monitoring as well as instant reaction capabilities anytime during the overall execution of the process. However, realizing such functions is...

    Provided By University of Haifa

  • White Papers // Jun 2008

    One Stop eGovernment for Small and Medium-Sized Enterprises (SME): A Strategic Approach and Case Study to Implement the EU Services Directive

    In view of EU services directive, providers of public services are required to reengineer their product and process organization. Of the underlying information systems and the IT infrastructure this has direct influence on the organization. The fundamental requirements include the establishment of points of single contact for enterprises and the...

    Provided By University of Haifa

  • White Papers // May 2008

    Collaborative e-Business Process Modelling: A Holistic Analysis Framework Focused on Small and Medium-Sized Enterprises

    In this paper, the authors propose a holistic analysis framework for collaborative e-Business process modeling approaches that takes into account the specific challenges Small and Medium-sized Enterprises (SME) are facing with regard to modeling inter-organizational processes. Based on concepts of the management approach Balanced ScoreCard (BSC) four different perspectives are...

    Provided By University of Haifa