Search : [ keyword: 게임 이론 ] (3)

Successful Win-Win Requirements Negotiation Method using Game Theoretic Approach

Kwan Hong Lee, Seok-Won Lee

http://doi.org/

With changing software industry structure, the emerging concept called Software Ecosystems (SECO) has various challenges that software engineers have to overcome. In marketdriven software product development, they should have the capability to offer high value products to their own business and their customers in order to being competitive. Each stakeholder’s perspectives and interests should be reconciled in terms of requirements so that engineers can offer high value products through requirements selection. Existing works have just mentioned the need of requirements negotiation between stakeholders without proposing detailed guidelines or practice. In this work, a systematic Requirements Negotiation process is proposed to resolve conflicts of interests of stakeholders in SECO. The interests of stakeholders are analyzed based on goal-based requirements engineering. The rationale of requirements conflict is structured for management. A stepwise requirements negotiation process aims at resolving requirements conflict by applying game theory concepts based on self-interested behaviors of stakeholders.

A Markov Game based QoS Control Scheme for the Next Generation Internet of Things

Sungwook Kim

http://doi.org/

The Internet of Things (IoT) is a new concept associated with the future Internet, and it has recently become a popular concept to build a dynamic, global network infrastructure. However, the deployment of IoT creates difficulties in satisfying different Quality of Service (QoS) requirements and achieving rapid service composition and deployment. In this paper, we propose a new QoS control scheme for IoT systems. The Markov game model is applied in our proposed scheme to effectively allocate IoT resources while maximizing system performance. The results of our study are validated by running a simulation to prove that the proposed scheme can promptly evaluate current IoT situations and select the best action. Thus, our scheme approximates the optimum system performance.

A Study on Service-based Secure Anonymization for Data Utility Enhancement

Chikwang Hwang, Jongwon Choe, Choong Seon Hong

http://doi.org/

Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr