Security mechanism in access control based on non-cooperative game
Correspondences|更新时间:2024-06-05
|
Security mechanism in access control based on non-cooperative game
Journal on CommunicationsVol. 35, Issue Z2, Pages: 246-250(2014)
作者机构:
北京工业大学 软件学院,北京 100124
作者简介:
基金信息:
The National Natural Science Foundation of China(61272500);The Natural Science Foundation of Beijing(4142008);Pre-launch of Beijing City Government Major Tasks and District Government Emergency Projects(Z131100005613030)
Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO. Security mechanism in access control based on non-cooperative game[J]. Journal on Communications, 2014, 35(Z2): 246-250.
DOI:
Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO. Security mechanism in access control based on non-cooperative game[J]. Journal on Communications, 2014, 35(Z2): 246-250. DOI: 10.3969/j.issn.1000-436x.2014.z2.034.
Security mechanism in access control based on non-cooperative game
Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system
a security mechanism is designed
which is suitable for access control
based on non-cooperative game theory in the game.When the subject makes an access request to the object
there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.
关键词
Keywords
references
SNYDER L . Formal models of capability-based protection systems [J ] . IEEE Trans on Computers , 1981 , 30 ( 3 ): 172 - 181 .
LAPADULA L J , BELL D E . Secure Computer Systems:a Mathematical Model [M ] . MA,USA : Mitre CorporationPress , 1973 .
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
FERRAIOLO D , RICHARD D,KUHN . Role-based access control [A ] . Proc NIST-NSA National Computer Security Conference [C ] . 1992 . 554 - 563 .
TONINELLI A , MONTANARI R , KAGAL L , et al . A semantic context-aware access control framework for secure collaborations in pervasive computing environments [A ] . Proc 5th International Semantic Web Conference [C ] . Athens,GA,USA , 2006 . 473 - 486 .
YUAN E , JIN T . Attribute based access control (ABAC) for Web service [A ] . Proc 2005 IEEE International Conference on Web Service [C ] . Orlando,FL,USA , 2005 . 561 - 569 .
ZHANG X , LI Y . An attribute-based access matrix model [A ] . Proceedings of the 2005 ACM Symposium on Applied Computing [C ] . Santa Fe,New Mexico , 2005 . 45 - 55 .
ZHENG G Z , LIU S Y , QI X G . Study on power control of wireless sensor networks based on non-cooperative game [J ] . Control and Decision , 2011 , 26 ( 7 ): 1014 - 1018 .
HOU J , ZHANG L W . Minimax method to solve the problem of generalized Nash equilibrium [J ] . Journal of Dalian University of Technology , 2013 , 53 ( 6 ): 924 - 929 .