• 제목/요약/키워드: User Requirement Analysis

Search Result 202, Processing Time 0.024 seconds

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

Analysis and Classification of Security Threats based on the Internet Banking Service (인터넷 뱅킹 서비스에서의 보안위협 분류 및 분석)

  • Lee, Kyung-Roul;Lee, Sun-Young;Yim, Kang-Bin
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.20-42
    • /
    • 2017
  • In this paper, we focus on classification of security threats and definitions of security requirements for Internet banking service. Threats are classified based on the past and potential incidents, based upon which we will be able to propose security requirements. In order to identify security threats, the structure of the Internet banking service is classified into three sections - the financial institutions, the network, and the user-terminal - and we defined arising threats for each section. We focused the analysis especially on the user-terminal section, which is relatively vulnerable, causing difficulties in securing stability of the service as a whole. The analyzed security threats are expected to serve the foundation for safe configuration of various Internet banking services.

Development of City Gas Facilities Information Management System Work analysis and System configuration (도시가스 시설정보 관리시스템 개발 - 업무분석 및 시스템구성을 중심으로)

  • 서창완;문은호
    • Spatial Information Research
    • /
    • v.4 no.2
    • /
    • pp.181-187
    • /
    • 1996
  • The purposes of this paper is to propose a methology for the efficient work analysis and system configuration for the developing of facilities information management system for city gas facilites. For this, work defining and user requirement was reflected on system, and systematic system development was derived through defining the problems of existing facilities management system. The study can be summarized as follows: First, existing work was computerized effectively by feedback with user interview on analyzing work. Second, it is appropriate to approach on system development in view of SI(System Integrate) which integrates Management Information System(MIS) and Geograph¬ic Information System(GIS). Third, it was found that Client-Server environment is good solution for now and future computer environment.

  • PDF

The Study of Software Optimal Release Using Sensitivity Analysis (민감도 분석을 이용한 소프트웨어 최적방출시기에 관한 연구)

  • Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.121-126
    • /
    • 2008
  • It is of great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This decision problem called an optimal release policies. In this paper discussed to specify an optimal release policies. In this paper, propose an optimal release policies of the life distribution applied Erlang distribution of special pattern of Gamma distribution. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. From Sensitivity Analysis, make out estimating software optimal release time.

  • PDF

Analysis of M-WiMAX Uplink Capacity with Receive Beamforming and Adjacent Channel Interference from WCDMA Downlink

  • Wang, Yu-Peng;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3A
    • /
    • pp.269-276
    • /
    • 2008
  • In this paper, we analyze the M-WiMAX UL capacity limits under 2-Tier cell layout, considering the effects of random user position, path loss models, fading channel and adjacent channel interference from WCDMA system. In order to make the analysis approximate to the practical system capacity, we propose a MCS-based capacity analysis method considering the effects of PER requirement and the utilized MCS levels in M-WiMAX system. The proposed MCS-based method is validated through a system-level Monte Carlo simulation. Furthermore, a comparison between the conventional Shannon method and the proposed MCS-based method is presented and the optimum cell radius is suggested.

A Lossless Multicast Handoff Method for Wireless ATM Networks (무선 ATM 망을 위한 손실없는 멀티캐스트 핸드오프 기법)

  • 하은용
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.88-96
    • /
    • 2001
  • Future mobile communication networks, which consist of ATM-based B-ISDN backbone networks and wireless ATM networks, will provide u user with broadband connection and QoS service. These network systems need the lossless handoff methods which support user mobility, satisfy ATM features such as ATM cell ordering and no ATM cell duplication and minimize buffer requirement for ATM cell buffering. In this paper we suggest a multicast-based handoff method to supp$\alpha$t lossless connection as well as to minimize buffer overhead. It establishes a dynamic multicast connection between source terminal and wireless member AP (access point)s. When the mobile terminal receives data packet correctly, it notifies the positive acknowledgement of the packet to all member APs. And member APs then release the MT related temporary buffer space for MT's future movement. Therefore member APs can eliminate unnecessary buffer usage and manage the buffer space efficiently. Analysis result shows that our handoff method has better performance in buffer requirement for lossless and seamless connection services over VCT (virtual connection tree) method and other dynamic multicast-based handoff methods.

  • PDF

Analysis of User Requirement for the Improvement of ECDIS to Enhance Navigational Safety and Work Efficiency (항해안전 및 업무효율을 위한 ECDIS 사용자측면에서의 개선사항 연구)

  • Jung, Min;Park, Yong-Sun;Kang, Suk-Young
    • Journal of Navigation and Port Research
    • /
    • v.39 no.3
    • /
    • pp.141-147
    • /
    • 2015
  • On July 1 2012, the carriage requirement for ECDIS became mandatory in a phased-in manner. The system has since been widely used as a core bridge navigation system and as a replacement for paper charts with a back up arrangement. However operational anomalies have been found in the system internationally. IMO and IHO have recognised these anomalies and seek for solution. This study has been conducted on a survey of seafarers on the use of ECDIS with regard to anomalies identification, level of the seafarer satisfaction and requirements for further functional improvement. From the results, the ECDIS user focused requirements suggested on strengthening the level of navigational safety and efficiency. The efficiency of using main functions of ECDIS was positively evaluated. However, there were concerns regarding its operational safety.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

A study on an Improved Model for Requirements Traceability (요구사항 추적모델 개선 연구 -공공부문 정보시스템 구축 사례를 중심으로-)

  • Kim, Chan-Hoe;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.247-254
    • /
    • 2012
  • The management of user requirements for information system development is a key element. The traceability has been studied in a specific method as using a traceability table or SOA related to the requirement management. But there are few case about proposing a objective and quantified evaluation method and judgement criterion for none-technical business managers. This researcher has proposed, easy to access by unprofessional and objective and qualifiable, evaluation methods and criteria of Judging for adequacy of requirements reflection in the development process of information system for the government office through a previous case study. In this study, I will give consideration to study the limitations of previous studies and improve the evaluation formula for measuring the reflection of the requirements and derive, reviewed to provide a variety of criteria for each business, through business case analysis.

Analysis of User Requirements Prioritization Using Text Mining : Focused on Online Game (텍스트마이닝을 활용한 사용자 요구사항 우선순위 도출 방법론 : 온라인 게임을 중심으로)

  • Jeong, Mi Yeon;Heo, Sun-Woo;Baek, Dong Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.3
    • /
    • pp.112-121
    • /
    • 2020
  • Recently, as the internet usage is increasing, accordingly generated text data is also increasing. Because this text data on the internet includes users' comments, the text data on the Internet can help you get users' opinion more efficiently and effectively. The topic of text mining has been actively studied recently, but it primarily focuses on either the content analysis or various improving techniques mostly for the performance of target mining algorithms. The objective of this study is to propose a novel method of analyzing the user's requirements by utilizing the text-mining technique. To complement the existing survey techniques, this study seeks to present priorities together with efficient extraction of customer requirements from the text data. This study seeks to identify users' requirements, derive the priorities of requirements, and identify the detailed causes of high-priority requirements. The implications of this study are as follows. First, this study tried to overcome the limitations of traditional investigations such as surveys and VOCs through text mining of online text data. Second, decision makers can derive users' requirements and prioritize without having to analyze numerous text data manually. Third, user priorities can be derived on a quantitative basis.