浏览全部资源
扫码关注微信
北京工业大学 软件学院,北京 100124
[ "张伊璇(1988-),女,河北深州人,北京工业大学博士生,主要研究方向为网络信息安全、云计算、访问控制等。" ]
[ "何泾沙(1961-),男,美籍华人,北京工业大学教授、博士生导师,主要研究方向为计算机与网络安全、网络测试技术、无线通信技术。" ]
[ "赵斌(1979-),男,山东济宁人,北京工业大学博士生,主要研究方向为网络与信息安全。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
张伊璇, 何泾沙, 赵斌. 基于非合作博弈的访问控制安全机制[J]. 通信学报, 2014,35(Z2):246-250.
Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO. Security mechanism in access control based on non-cooperative game[J]. Journal on communications, 2014, 35(Z2): 246-250.
张伊璇, 何泾沙, 赵斌. 基于非合作博弈的访问控制安全机制[J]. 通信学报, 2014,35(Z2):246-250. DOI: 10.3969/j.issn.1000-436x.2014.z2.034.
Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO. Security mechanism in access control based on non-cooperative game[J]. Journal on communications, 2014, 35(Z2): 246-250. DOI: 10.3969/j.issn.1000-436x.2014.z2.034.
访问控制技术是保护计算机系统和网络中的敏感信息和关键资源的一种重要的信息安全技术。但是传统的访问控制方法只能被动地对用户的访问请求进行响应,无法完全适应如今不断动态变化的网络环境。为了提高访问控制中系统应对恶意攻击和威胁的能力,基于博弈论中的非合作博弈方法,设计了一套适用于访问控制模型的安全机制,当访问主体提出访问请求后,对访问主体与被访问客体进行非合作博弈,得到纳什均衡,最终通过纳什均衡与门限的比较决定是否对访问主体进行授权。实验证明了该安全机制的有效性。
Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system
a security mechanism is designed
which is suitable for access control
based on non-cooperative game theory in the game.When the subject makes an access request to the object
there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.
SNYDER L . Formal models of capability-based protection systems [J ] . IEEE Trans on Computers , 1981 , 30 ( 3 ): 172 - 181 .
LAPADULA L J , BELL D E . Secure Computer Systems:a Mathematical Model [M ] . MA,USA : Mitre CorporationPress , 1973 .
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
FERRAIOLO D , RICHARD D,KUHN . Role-based access control [A ] . Proc NIST-NSA National Computer Security Conference [C ] . 1992 . 554 - 563 .
TONINELLI A , MONTANARI R , KAGAL L , et al . A semantic context-aware access control framework for secure collaborations in pervasive computing environments [A ] . Proc 5th International Semantic Web Conference [C ] . Athens,GA,USA , 2006 . 473 - 486 .
YUAN E , JIN T . Attribute based access control (ABAC) for Web service [A ] . Proc 2005 IEEE International Conference on Web Service [C ] . Orlando,FL,USA , 2005 . 561 - 569 .
ZHANG X , LI Y . An attribute-based access matrix model [A ] . Proceedings of the 2005 ACM Symposium on Applied Computing [C ] . Santa Fe,New Mexico , 2005 . 45 - 55 .
郑耿忠 , 刘三阳 , 齐小刚 . 基于非合作博弈的无线传感器网络功率控制研究 [J ] . 控制与决策 , 2011 , 26 ( 7 ): 1014 - 1018 .
ZHENG G Z , LIU S Y , QI X G . Study on power control of wireless sensor networks based on non-cooperative game [J ] . Control and Decision , 2011 , 26 ( 7 ): 1014 - 1018 .
侯剑 , 张立卫 . 广义纳什均衡问题求解的极小极大方法 [J ] . 大连理工大学学报 , 2013 , 53 ( 6 ): 924 - 929 .
HOU J , ZHANG L W . Minimax method to solve the problem of generalized Nash equilibrium [J ] . Journal of Dalian University of Technology , 2013 , 53 ( 6 ): 924 - 929 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构