期刊文献+

可信网络中一种基于行为信任预测的博弈控制机制 被引量:70

A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network
在线阅读 下载PDF
导出
摘要 近年来,网络可信的研究已成为一个研究热点,其中用户的行为信任研究是网络可信研究的重要内容之一.由于用户行为信任的评估是基于过去交往的行为证据之上,而我们需要的是未来的用户行为信任等级,因此科学地预测未来用户的行为信任等级是非常必要的,文中首先论述了如何利用贝叶斯网络对用户的行为信任进行预测,提供的机制不仅可以预测单属性条件下的行为信任等级,而且可以预测多属性条件下的行为信任等级.由于信任和风险是并存的,单独依靠预测的信任等级进行决策是非常片面和危险的,因此该文的其余部分将行为信任预测结果和博弈分析相结合对双方的支付矩阵进行分析,计算出了基于用户安全行为属性的混合纳什均衡策略,证明了服务提供者进行控制的决策条件,得出了相关的一些重要性质,最后通过一个例子来说明论文的应用.该文的结果对于量化分析用户行为信任具有重要的理论意义.文章在分析过程和实例中结合了数字化电子资源的实际网络应用背景,因此该机制在实际的网络应用中同样具有重要的指导意义. In recent years, the trustworthy network research has become a research focus. User trust study is one important branch of trustworthy network research field, and it includes not only user identity trust but also user behaviour trust. The traditional authorization and authentication security mechanism mainly solve user identity trust, it can't deal with user behaviour trust. User behaviour trust strengthens the dynamic state processing of the user, providing the strategy foundation for implementation of intelligent adaptive network security. Because the behaviour trust is based on the evidence of past transaction, but what we need is the future user behaviour trust, therefore scientifically predicting user future behaviour trust is very necessary. This paper first discusses a mechanism that how to use Bayesian network to forecast user behaviour trust. The mechanism not only can predict behaviour trust grade under the single trust attribute conditions, but also can predict trust grade under the multi-trust-attribute conditions. As trust coexists with risk, decision-making that only relay on forecasted trust grade is very one-sided and dangerous. Therefore we must also analyze risk in the decision-making of control. The rest of this paper analyzes payoff matrix of Game-theory combining foregoing forecasts results, figures out mixed Nash equilibrium strategy based on user secure attribute, puts forward the decisionmaking conditions of controlling for the service provider. Lastly the authors give an example to illustrate how to use the result of the paper and analyze its advantage comparing existing user control strategy. The result of the paper not only has an important theoretical significance to quantitatively analyze user behavior trust, but also has a major guiding significance in the actual network application due to the authors consider the actual network application background of Providing of Digital Electronic Resources in the example and in all process of analysis.
作者 田立勤 林闯
出处 《计算机学报》 EI CSCD 北大核心 2007年第11期1930-1938,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60673184 60673187和90412012) 国家"九七三"重点基础研究发展规划项目基金(2006CB708301) 河北省科学技术研究与发展指导计划项目基金(07213570)资助.~~
关键词 可信网络 行为信任 预测 博弈控制 trustworthy network behaviour trust prediction game-theoretic control
  • 相关文献

参考文献13

  • 1Ruohomaa S,Kutvonen L.Trust management survey//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:77-92
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3Theodorakopoulos,George,Baras,John S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
  • 4Pal P,Webber F,Atighetchi M,Combs N.Trust assessment from observed behavior:Toward and essential service for trusted network computing//Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2006:285-292
  • 5Ciaran B,Karl K,Jean-Marc S,Vinny C.Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:289-304
  • 6Tian Li-Qin,Lin Chuang,Ji Tie-Guo.Kind of quantitative evaluation of user behaviour trust using AHP.Journal of Computational Information Systems,2007,3(4):1329-1334
  • 7Lin Ai-Zhong,Vullings E,Dalziel J.A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops.Changsha,China,2006:557-564
  • 8Bell M.The use of game theory to measure the vulnerability of stochastic networks.IEEE Transactions on Reliability,2003,52(1):63-68
  • 9Bertino E,Squicciarini A C,Martino L,Paci F.An adaptive access control model for web services.International Journal of Web Services Research,2006,3(3):27-60
  • 10Hassan T,Morteza A,Rasool J.Trust-based user-role assignment in role-based access control//Proceedings of the AICCSA.Amman,Jordan,2007:807-814

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献251

同被引文献611

引证文献70

二级引证文献461

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部