2017
DOI: 10.1016/j.amc.2017.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Non-zero-sum cooperative access control game model with user trust and permission risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Researchers [25,26] combined user trust with the risk to conduct an access control study. Trust is user-related, risk is permission-related, and these two are intrinsically correlated because the users and permissions are main and indispensable elements in the access control system [10]. Trust and risk are effectively combined together in our paper and risk appears in the game model in an implicit way.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…Researchers [25,26] combined user trust with the risk to conduct an access control study. Trust is user-related, risk is permission-related, and these two are intrinsically correlated because the users and permissions are main and indispensable elements in the access control system [10]. Trust and risk are effectively combined together in our paper and risk appears in the game model in an implicit way.…”
Section: Related Workmentioning
confidence: 98%
“…However, static and predefined access control policies cannot measure user's access behavior precisely, especially because users at different levels of trust can bring about benefits or losses in different amounts [9]. Therefore, a service provider demands a reasonable and accurate access control mechanism in which the interactions between information sharing and protection bring about a socially positive result for both the service provider and its users [10]. In 1996, Blaze M [11] proposed the concept of trust management and introduced a trust mechanism into security research for the first time, thus providing a new way of solving security problems.…”
Section: Introductionmentioning
confidence: 99%
“…Game theory allows a system to weigh risks and benefits of granting access to a user, and has been used to set thresholds for trust levels [7], [20]. He et al uses game theory to analyze access control in a cloud environments where players include users and cloud service providers [20].…”
Section: Related Workmentioning
confidence: 99%
“…One possible solution to address this issue is to use game theory [7]. However, integrating game theory and maintaining trust in a federated system adds to complexity of the system and incurs extra cost.…”
Section: Introductionmentioning
confidence: 99%
“…Chunyong et al [7] studied the hybrid recommendation algorithm for large data based on optimization and constructed some trust models, and the results showed that the error was reduced compared with the traditional method. Considering the practical existence and involvement of permission risk, Helil et al [12] constructed a non-zero-sum game model that chose trust, risk, and cost as metrics in the payoff functions of player and analyzed the Pareto efficient strategy from the application system and the user. Based on game theory, Furuncu and Sogukpinar [13] proposed an extensible security risk assessment model in cloud environment, which can assess whether the risk should be determined by the cloud provider or tenant.…”
Section: Related Workmentioning
confidence: 99%