User Requirement

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 47988 Experts worldwide ranked by ideXlab platform

Margaret Burnett - One of the best experts on this subject based on the ideXlab platform.

Joarder Kamruzzaman - One of the best experts on this subject based on the ideXlab platform.

  • reputation and User Requirement based price modeling for dynamic spectrum access
    IEEE Transactions on Mobile Computing, 2014
    Co-Authors: Rakib Hassan, Gour Karmakar, Joarder Kamruzzaman
    Abstract:

    Secondary service providers can buy spectrum resources from primary service providers for a short or long period of time and exploit it to solve the problem of spectrum scarcity. This buying decision of spectrum buyers can depend on several factors including pricing of the spectrum, reputation of a seller, and duration of the contract and spectrum quality. However, existing pricing models for dynamic spectrum access consider mainly bandwidth which makes them unsuitable for real-world trading. In this paper, we consider these issues related to the pricing of spectrum sale in terms of microeconomic theories. First, we consider reputation of spectrum sellers and update it dynamically by considering a buyer’s own trading experience with the sellers and collecting recommendations on sellers from other buyers. Second, trustworthiness of recommenders as well as incentive to encourage recommendations are modeled. Third, contract duration and spectrum quality are incorporated such that a buyer’s utility is formulated as a function of buyer’s resource Requirement, reputation of seller and trustworthiness of recommenders. Fourth, the model is analyzed using dynamic pricing of the market and the solution is obtained using market equilibrium. Results demonstrate the superiority of our model over the existing microeconomic models for dynamic spectrum trading.

Shamik Sural - One of the best experts on this subject based on the ideXlab platform.

  • minimizing organizational User Requirement while meeting security constraints
    ACM Transactions on Management Information Systems, 2015
    Co-Authors: Shamik Sural, A K Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri
    Abstract:

    Large systems are complex and typically need automatic configuration to be managed effectively. In any organization, numerous tasks have to be carried out by employees. However, due to security needs, it is not feasible to directly assign any existing task to the first available employee. In order to meet many additional security Requirements, constraints such as separation of duty, cardinality and binding have to be taken into consideration. Meeting these Requirements imposes extra burden on organizations, which, however, is unavoidable in order to ensure security. While a trivial way of ensuring security is to assign each User to a single task, business organizations would typically like to minimize their costs and keep staffing Requirements to a minimum. To meet these contradictory goals, we define the problem of Cardinality Constrained-Mutually Exclusive Task Minimum User Problem (CMUP), which aims to find the minimum Users that can carry out a set of tasks while satisfying the given security constraints. We show that the CMUP problem is equivalent to a constrained version of the weak chromatic number problem in hypergraphs, which is NP-hard. We, therefore, propose a greedy solution. Our experimental evaluation shows that the proposed algorithm is both efficient and effective.

  • impact of multiple t t smer constraints on minimum User Requirement in rbac
    International Conference on Information Systems Security, 2014
    Co-Authors: Shamik Sural, A K Majumdar
    Abstract:

    Separation of Duty (SoD) constraints are widely used to specify Role Based Access Control (RBAC) policies in commercial applications. It has been shown previously that efficient implementation of SoD policies in RBAC can be done using t-t Statically Mutually Exclusive Roles (SMER) constraints. In this paper, we present a method for finding the minimum number of Users required under multiple t-t SMER constraints. The problem is shown to be NP-complete. We model the general problem using graphs, and present a two-step method for solving it. In the first step, a greedy algorithm is proposed that selects a graph which is likely to have the minimum chromatic number out of a set of graphs. The second step uses a known chromatic number finding algorithm for determining the chromatic number of the graph selected in the first step. Results for different values of the number of roles and the number of constraints as well as for different values of t have been reported.

  • minimum User Requirement in role based access control with separation of duty constraints
    Intelligent Systems Design and Applications, 2012
    Co-Authors: Shamik Sural, A K Majumdar
    Abstract:

    Constraints, specifically Separation of Duty (SoD) constraints, constitute an essential component for specifying Role Based Access Control (RBAC) policies. While it has been shown earlier that SoD constraints can be effectively represented using a set of t - t Statically Mutually Exclusive Roles (SMER) constraints, this paper presents a method for finding minimum number of Users under multiple SMER constraints. We show that one way of solving the problem is to evaluate chromatic numbers for a set of graphs. However, since exhaustive search is computationally quite expensive, we present a genetic algorithm formulation of the problem. Each chromosome is a string of positive integers within a certain range and its length equals the number of t-t SMER constraints in the system. We report our results for different values of the number of roles and the number of constraints and also for different values of t.

A K Majumdar - One of the best experts on this subject based on the ideXlab platform.

  • minimizing organizational User Requirement while meeting security constraints
    ACM Transactions on Management Information Systems, 2015
    Co-Authors: Shamik Sural, A K Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri
    Abstract:

    Large systems are complex and typically need automatic configuration to be managed effectively. In any organization, numerous tasks have to be carried out by employees. However, due to security needs, it is not feasible to directly assign any existing task to the first available employee. In order to meet many additional security Requirements, constraints such as separation of duty, cardinality and binding have to be taken into consideration. Meeting these Requirements imposes extra burden on organizations, which, however, is unavoidable in order to ensure security. While a trivial way of ensuring security is to assign each User to a single task, business organizations would typically like to minimize their costs and keep staffing Requirements to a minimum. To meet these contradictory goals, we define the problem of Cardinality Constrained-Mutually Exclusive Task Minimum User Problem (CMUP), which aims to find the minimum Users that can carry out a set of tasks while satisfying the given security constraints. We show that the CMUP problem is equivalent to a constrained version of the weak chromatic number problem in hypergraphs, which is NP-hard. We, therefore, propose a greedy solution. Our experimental evaluation shows that the proposed algorithm is both efficient and effective.

  • impact of multiple t t smer constraints on minimum User Requirement in rbac
    International Conference on Information Systems Security, 2014
    Co-Authors: Shamik Sural, A K Majumdar
    Abstract:

    Separation of Duty (SoD) constraints are widely used to specify Role Based Access Control (RBAC) policies in commercial applications. It has been shown previously that efficient implementation of SoD policies in RBAC can be done using t-t Statically Mutually Exclusive Roles (SMER) constraints. In this paper, we present a method for finding the minimum number of Users required under multiple t-t SMER constraints. The problem is shown to be NP-complete. We model the general problem using graphs, and present a two-step method for solving it. In the first step, a greedy algorithm is proposed that selects a graph which is likely to have the minimum chromatic number out of a set of graphs. The second step uses a known chromatic number finding algorithm for determining the chromatic number of the graph selected in the first step. Results for different values of the number of roles and the number of constraints as well as for different values of t have been reported.

  • minimum User Requirement in role based access control with separation of duty constraints
    Intelligent Systems Design and Applications, 2012
    Co-Authors: Shamik Sural, A K Majumdar
    Abstract:

    Constraints, specifically Separation of Duty (SoD) constraints, constitute an essential component for specifying Role Based Access Control (RBAC) policies. While it has been shown earlier that SoD constraints can be effectively represented using a set of t - t Statically Mutually Exclusive Roles (SMER) constraints, this paper presents a method for finding minimum number of Users under multiple SMER constraints. We show that one way of solving the problem is to evaluate chromatic numbers for a set of graphs. However, since exhaustive search is computationally quite expensive, we present a genetic algorithm formulation of the problem. Each chromosome is a string of positive integers within a certain range and its length equals the number of t-t SMER constraints in the system. We report our results for different values of the number of roles and the number of constraints and also for different values of t.

Manfred Tscheligi - One of the best experts on this subject based on the ideXlab platform.

  • designing accessible experiences for older Users User Requirement analysis for a railway ticketing portal
    Universal Access in The Information Society, 2011
    Co-Authors: Ozge Subasi, Michael Leitner, Norman Hoeller, Arjan Geven, Manfred Tscheligi
    Abstract:

    This article presents the results of a survey that shows that older Users differ in their attitude and experience towards the Internet not only according to their age or to their previous knowledge with Internet services, but also according to what they are expecting from this media. The aim of this study was to collect information about barriers on usage and perception of an online ticketing service for a nationwide public railway company, in order to enhance the notion of “accessibility” toward a broader understanding including non-technical accessibility factors as semantic accessibility and/or procedural accessibility. The results of the survey with 1,208 participants and additionally focus groups, interviews and qualitative analysis of User feedback indicate that in order to improve and optimize the usage of the online system for older adults, it is necessary to develop a system which is not only universally accessible, but also satisfies the specific expectations of senior Users. This article concentrates on designing accessible User experiences and presents several recommendations to the area and for WCAG 2.0 according to the results.

  • User Requirement analysis for a railway ticketing portal with emphasis on semantic accessibility for older Users
    Proceedings of the 2009 International Cross-Disciplinary Conference on Web Accessibililty (W4A), 2009
    Co-Authors: Michael Leitner, Ozge Subasi, Arjan Geven, Norman Holler, Manfred Tscheligi
    Abstract:

    In this paper, we present the results from a survey on User Requirements for older Users of online ticketing services of a nationwide railway ticket and travel information portal. Our survey shows that older Users differentiate in their attitude towards internet according to their experience with internet services and the service provided, not only according to their age. Further, our study indicates that in contrary to common belief advertisement or interactive elements are not perceived as negative all the time. The results of a questionnaire with 1200 responses, focus groups, interviews and qualitative analysis of User feedback also indicate that in order to improve and optimize the usage of the online system for older adults, it is needed to supply the system not only with technical accessibility Requirements but also with an understanding of universal accessibility Requirements. Universal Requirements are defined by real User and usage cases and they consider standardization on not only coding but also predictability of usage and same patterns of interaction for similar websites.