Security mechanism in access control based on non-cooperative game

Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic net...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.034/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539652776886272
author Yi-xuan ZHANG
Jing-sha HE
Bin ZHAO
author_facet Yi-xuan ZHANG
Jing-sha HE
Bin ZHAO
author_sort Yi-xuan ZHANG
collection DOAJ
description Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.
format Article
id doaj-art-5761114b017646cd8fd788fbfcc6a69d
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-5761114b017646cd8fd788fbfcc6a69d2025-01-14T06:45:19ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-11-013524625059689573Security mechanism in access control based on non-cooperative gameYi-xuan ZHANGJing-sha HEBin ZHAOAccess control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.034/access controlnon-cooperative gamelevel-permissions-payoffs tablelevel-permissions-threshold table
spellingShingle Yi-xuan ZHANG
Jing-sha HE
Bin ZHAO
Security mechanism in access control based on non-cooperative game
Tongxin xuebao
access control
non-cooperative game
level-permissions-payoffs table
level-permissions-threshold table
title Security mechanism in access control based on non-cooperative game
title_full Security mechanism in access control based on non-cooperative game
title_fullStr Security mechanism in access control based on non-cooperative game
title_full_unstemmed Security mechanism in access control based on non-cooperative game
title_short Security mechanism in access control based on non-cooperative game
title_sort security mechanism in access control based on non cooperative game
topic access control
non-cooperative game
level-permissions-payoffs table
level-permissions-threshold table
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.034/
work_keys_str_mv AT yixuanzhang securitymechanisminaccesscontrolbasedonnoncooperativegame
AT jingshahe securitymechanisminaccesscontrolbasedonnoncooperativegame
AT binzhao securitymechanisminaccesscontrolbasedonnoncooperativegame