首页 | 本学科首页   官方微博 | 高级检索  
     

基于博弈理论的访问控制奖惩激励约束机制
引用本文:赵斌,肖创柏,张问银,古雪.基于博弈理论的访问控制奖惩激励约束机制[J].电子与信息学报,2019,41(4):1002-1009.
作者姓名:赵斌  肖创柏  张问银  古雪
作者单位:北京工业大学信息学部 北京 100124;济宁学院计算机科学系 曲阜 273155;临沂大学信息科学与工程学院 临沂 276000;北京工业大学信息学部 北京 100124;临沂大学信息科学与工程学院 临沂 276000
基金项目:国家自然科学基金;国家自然科学基金;北京市自然科学基金;山东省重点研发计划;山东省自然科学基金;高等学校科技计划
摘    要:基于信任的访问控制问题是面向开放式网络访问控制中研究的热点。该文针对开放式网络环境下网络交互实体不诚信合作的交互访问行为,建立了基于信任的动态访问控制博弈模型,并通过设计的奖惩激励约束机制促使交互实体在自身利益驱动下理性选择系统(设计者)期望的策略,以利益作为驱动力,奖励诚信节点,惩罚约束激励不诚信节点,实现符合目标要求实体间的总体均衡状态。仿真实验和结果分析表明,在网络交互实体的不诚信访问问题上该激励约束机制是有效的。

关 键 词:开放式网络    博弈理论    访问控制    激励    约束机制
收稿时间:2018-04-28

Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory
Bin ZHAO,Chuangbai XIAO,Wenyin ZHANG,Xue GU.Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory[J].Journal of Electronics & Information Technology,2019,41(4):1002-1009.
Authors:Bin ZHAO  Chuangbai XIAO  Wenyin ZHANG  Xue GU
Affiliation:1.Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China2.Department of Computer Science, Jining University, Qufu 273155, China3.College of Information Science and Engineering, Linyi University, Linyi 276000, China
Abstract:Trust based access control is a research hotspot in  open network that access control is one of the importation technology of information security. For the interactive access behaviors of non-honest cooperation between network interactive entities in open network, the dynamic game access control model is established based on trust, and interactive entities are encouraged to rationally choose strategies expected by the system (the designer) driven by its own benefits through the designed mechanism. Taking benefits as the driven force, the mechanism rewards the honest nodes and punishes and restrains the non-honest nodes, and then reaches the general state of equalization between entities which meets the goal. The simulation experiment and result analysis show that the incentive and restraint mechanism is valid and necessary on the issue of non-honest access between network interactive entities.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号