期刊文献+

基于可信度的信号博弈授权模型研究

Research of the Signal Gambling Authorization Model Based on Confidence Level
在线阅读 下载PDF
导出
摘要 基于用户行为的动态授权模型是一种提高网络安全比较好的方法,但是在获取和处理用户行为时,通过历史知识进行预测用户的行为或者用户的攻击行为真实发生后.再对用户的授权进行调整的方法存在着无法预先地、主动地调整和保护的问题。该文提出了一种基于可信度的信号博弈授权模型,使得授权更加准确、科学.提高网络安全。最后通过实验表明该模型能够合理调整授权,确保授权符合网络安全情况。 The dynamic authorization model based on user's behaviors is a feasible method to improve network security; But when gaining and processing user's behaviors, this method exists a defect that we cannot take the initiative to adjust authorization and protect the system in advance through predicting the user's behaviors by historical knowledge of attack or discovering that the system has suffered an attack af- ter the user's attack truly happened, then adjusting the user's authorization. This article proposed a signal gambling authorization model based on confidence level, in which the authorization is more accurate and scientific, and the model greatly enhances the network security. Finally, experiments show that the model can adjust the authorization properly to ensure that the authorization perfectly complies with net- work security.
作者 赵波 袁伟 龚凤娇 ZHAO Bo, YUAN Wei, GONG Feng-jiao (School of Computer, Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education, Wuhan 430072, China)
出处 《电脑知识与技术》 2010年第9期6987-6989,6994,共4页 Computer Knowledge and Technology
关键词 C\S模型 可信度 信号博弈 网络安全 C/S model confidence level signal gambling network security
作者简介 赵波(1972-),男,教授,博士生导师,主要研究方向为信息安全,可信计算; 袁伟(1988-),男,武汉大学计算机学院2007级本科生,主要研究方向为信息安全,可信计算。
  • 相关文献

参考文献5

  • 1冀铁果,田立勤,胡志兴,孙锦霞.可信网络中一种基于AHP的用户行为评估方法[J].计算机工程与应用,2007,43(19):123-126. 被引量:27
  • 2In-Koo Cho,David M.Kreps.Sinaling Games and Stable Equilibria[J].The Quarterly Journal of Economics,1987,102:179-221.
  • 3谢以予.经济博弃论[M].2版.上海:复旦大学出版社,2002.
  • 4Joel Sobel.Signaling Games[EB/OL].[2007].http://en.wikipedia.org/wiki/Signaling_games.
  • 5江应络.系统工程[M].北京:机械工业出版社,2003.

二级参考文献11

  • 1李鸿培.何谓可信网络架构[J].计算机安全,2005(2):36-38. 被引量:4
  • 2干志勤,曾国荪.网格环境下的基于行为的信任评估模型[J].计算机应用与软件,2005,22(2):62-64. 被引量:14
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4安氏中国.安氏打造企业可信终端计算环境[EB/OL].(2005).http:∥bj.is-one.net/aboutus/news/2005-01-10/news1i10i311.html.
  • 5Paulson L D.Stopping intruders outside the gates[J].IEEE Computer,2002,35 (11):20-22.
  • 6Theodorakopoulos G,Baras J S.Trust evaluation in Ad hoc networks[C]//Proceedings of the 2004 ACM Workshop on Wireless Security,WiSe,Philadelphia,PA,United States:Association for Computing Machinery,2004:1-10.
  • 7Ren K,Li T Y,Wan Z G,et al.Highly reliable trust establishment scheme in ad hoc networks[J].Computer Networks,2004 (45):687-699.
  • 8Tian Li-qin,Lin Chuang,Ji Tie-guo.Quantitative analysis of trust evidence in Internet[C]//2006 IEEE International Conference on Communication Technology,2006.
  • 9汪应络.系统工程[M].北京:机械工业出版社,2003.
  • 10http://bandwidthd.sourceforge.net/,2006.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部