期刊文献+

基于博弈论框架的用户行为决策模型 被引量:3

User Behavior Decision-making Model Based on Game-theory Framework
下载PDF
导出
摘要 从风险与安全的角度提出一种新的用户行为决策模型,将服务提供者和用户作为非合作博弈的对立方,在不完全信息静态博弈的基础上研究博弈参与者之间的交互行为。从博弈参与者的相互依赖的行动选择角度建立博弈模型,求出最优混合策略。在此基础上,服务提供者从最大化自己利益的角度作出决策。 This paper proposes a new model of user behavior decision-making based on the integration of risk and security. The service provider and the user are regarded as the two players in the non-cooperation games, and their interactions are analyzed based on static games model with incomplete information. The game model is built in the point of view that the players choose their actions depending on each other's action. The mixed strategy equilibriums are derived from the model; and under the mixed strategy equilibriums, the service provider makes the decision such as refusing access or accepting access which can maximize his utility.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第9期159-161,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673187,90412012) 国家“973”计划前期研究专项基金资助项目(2006CB708301) 国家杰出青年科学基金资助项目(60429202)
关键词 博弈论 服务提供者 用户 纳什均衡 决策 game theory service provider user Nash equilibrium decision-making
  • 相关文献

参考文献5

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Wang Yuanzhuo,Lin Chuang,Yang Yang,et al.A Game-based Intrusion Tolerant Mechanism for Grid Service[C]//Proc.of the 5th International Conference on Grid and Cooperative Computing.[S.l.]:IEEE Press,2006:380-386. 被引量:1
  • 3Patcha A,Jung-Min Park.A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks[D].WestPoint,NY,USA:United States Military Academy,2004-06. 被引量:1
  • 4张维迎著..博弈论与信息经济学[M],1996:612.
  • 5Tian Liqin,Lin Chuang,Sun jinxia.A Kind of Prediction Method of User Behaviour for Future Trustworthy Network[C]//Proc.of the 10th International Conference on Communication Technology.Beijing,China:[s.n.],2006-10:199-202. 被引量:1

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,. 被引量:4
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33 被引量:1
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65 被引量:1
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22 被引量:1
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998 被引量:1
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656 被引量:1
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743 被引量:1
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33 被引量:1
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16 被引量:1

共引文献252

同被引文献21

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部