IMPROVING USER EXPERIENCE THROUGH RULE-BASED SERVICE CUSTOMIZATION

2005 ◽  
Vol 14 (04) ◽  
pp. 469-502 ◽  
Author(s):  
RICHARD HULL ◽  
BHARAT KUMAR ◽  
DANIEL LIEUWEN ◽  
PETER F. PATEL-SCHNEIDER ◽  
ARNAUD SAHUGUET ◽  
...  

The web and converged services paradigm promises tremendous flexibility in the creation of rich composite services for enterprises and end users. The flexibility and richness offers the possibility of highly customized, individualized services for the end user and hence revenue generating services for service providers (e.g. ASPs, telecom network operators, ISPs). But how can end users (and enterprises) specify their preferences when a myriad of possibilities and potential circumstances need to be addressed? In this paper, we advocate a solution based on policy management where user preferences are specified through forms but translated into rules in a high-level policy language. This paper identifies the requirements for this kind of interpretation, and describes the Houdini system (developed at Bell Labs) which offers a rich rule-based language and a framework that supports intuitive, forms-based provisioning interfaces.

Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Ryota Egashira ◽  
Akihiro Enomoto ◽  
Tatsuya Suda

In Service-Oriented Computing, service providers publish their services by deploying service components which implement those services into a network. Since such services are distributed around the network, Service-Oriented Computing requires the functionality to discover the services that meet certain criteria specified by an end user. In order to overcome the scalability issue that the current centralized discovery mechanism inherently has, distributed discovery mechanisms that the P2P research community has developed may be promising alternatives. This chapter outlines existing distributed mechanisms and proposes a novel discovery mechanism that utilizes end users’ preferences. The proposed mechanism allows end users to return their feedback that describes the degree of the preference for discovered services. The returned preference information is stored at nodes and utilized to decide where to forward subsequent queries. The extensive simulation demonstrates that the proposed mechanism meets key requirements such as selectivity, efficiency and adaptability.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


1994 ◽  
Vol 116 (2) ◽  
pp. 522-530 ◽  
Author(s):  
D. L. Thurston ◽  
C. A. Crawford

Expert systems for design often include provisions for comparison of preliminary design alternatives. Historically, this task has been done on an ad hoc basis (or not at all) due to two difficulties. The first difficulty is design evaluation of multiple attributes. The second is that of taking into account highly subjective end-user preferences. Design experts have developed techniques which have enabled them to deal with these two difficulties; weighted average methods for the former and heuristic “rules of thumb” which categorize end-users for the latter. Limitations of these techniques are that the accuracy and precision of weighted average methods is inadequate, and that the “rules of thumb” might be reasonable and valid for most end-users, but not for some others. This paper brings quantitative rigor to the modelling of end-user preferences which is equal to that used in other phases of engineering analysis. We present a technique by which a heuristic rule base derived from technical experts can be analyzed and modified to integrate quantitative assessment of end-users’ subjective preferences. The operations research tool of multiattribute utility analysis is integrated with artificial intelligence techniques to facilitate preliminary evaluation of design alternatives of multiple attributes specific to individual users. The steps of the methodology are: develop the heuristic rule base, analyze the rule base to separate subjective from objective rules, add a subjective multiattribute utility assessment module, add an uncertainty assessment module, make objective rules explicit, and express performance attributes in terms of design decision variables. The key step is making the distinction between subjective and objective aspects of rules, and replacing the former with utility analysis. These steps are illustrated through an expert system for materials selection for a sailboat mast. Results indicate improved expert system performance for both “typical” and “atypical” end-users.


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2012 ◽  
Vol 2 (2) ◽  
pp. 31-40
Author(s):  
Siddesh G. M. ◽  
Srinivasa K. G.

With an advent of gaining popularity in cloud computing, there is a huge demand in ad-hoc services by the end users. These ad-hoc services cannot fully be provided by a service provider; hence Cloud mashup is a solution for this requirement. Cloud mashup is technology where end users can integrate different services of cloud service providers and create their own customized ad-hoc services. This paper proposes an efficient enterprise cloud mashup framework which supports dynamic composition of services to create a new service to the end users. The proposed framework is composed of an adapter, widgets, widget library and a mashup constructor module. Even a non technical end user can easily generate their own customized service on a cloud platform. Experiments reveal that the proposed framework is an efficient enterprise with cloud mashup service integration framework.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


2020 ◽  
pp. 095207672091169
Author(s):  
Michael Moran ◽  
Krystian Seibert ◽  
Carolyn Barnes ◽  
Fiona Martin

Although co-design is acknowledged as an emerging tool in public administration for use in program or service system design, it has not been widely applied to complex policy spheres, such as law and regulation. In the context of policy development for the field of social enterprise, we explored the use of co-design as a facilitation method to elicit end-users’ experience of regulation and to generate options for reform. Specifically, this involved the use of LEGO® Serious Play® to understand end-user views on legal structures following a push by policy advocates in Australia for a structure to serve the needs of social enterprise, similar to that available in the United Kingdom. The article makes two contributions to research on co-design in public policy. The first contribution is methodological. We offer insights into the application of co-design to a new area, law and regulation, finding that co-design is useful for generating bottom-up insights into the regulatory preferences of end-users but has certain limitations as a tool for research and policy development, notably in relation to the feasibility of the insights it may provide. The second contribution is uncovering empirical insights into end-user preferences regarding how regulatory reform might improve the policy environment for social enterprise development in Australia and beyond.


Sign in / Sign up

Export Citation Format

Share Document