Volume 3, Issue 1, January 2013

Early Requirement Engineering based on Data Mining and Social Modelling [Download Paper]

Elaheh Homayounvala 

Abstract—Users' needs and interests are major issues in information system design. In order to design systems that truly meet users' needs or add new features to already developed systems to better satisfy users' needs, early requirement engineering can play a significant role. Early requirement engineering refers to issues that should come before the traditional requirements analysis activities. This paper proposes utilization of data mining techniques as a tool to acquire better understanding of users' needs and interests in early requirement engineering. We believe that information systems with large datasets hold a wealth of information hidden in their databases. Therefore, data mining techniques can be applied to uncover users' needs and interests for better domain understanding and also in order to design new features for system development. In this paper, a new methodology for requirement elicitation based on data mining techniques is proposed. The proposed methodology has an evaluation phase in which identified requirements, can be analyzed based on Strategic Dependency and Strategic Rationale models in i* framework which is based on social modeling. Consistency of customer and other stakeholders' requirements can be studied in this methodology by strategic reasoning and the label propagation algorithm. 

  --------------------------------------------------------------------------------------------------------------------------------------------------------------------

Blind Signature Scheme Based on the Matrix Conjugation [Download Paper]

Maheswara Rao Valluri

Abstract—A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer, such that signer does not see the message being signed and does not learn any information on the signature being produced. In this paper, we propose a blind signature scheme based on the difficulty of solving conjugate search problem over group of matrices. The security of the proposed scheme relies upon the conjugate search problem in the platform group of matrices. The platform group we suggest is the group of 3×3 matrices over truncated multivariable polynomial over a ring.