期刊文献+

基于博弈论的信息系统生存性提升方法研究 被引量:2

Approach on Promoting Survivability for Information System Based on Game-theory
下载PDF
导出
摘要 当前对信息系统生存性的研究主要集中在静态环境下生存性定量分析及保障的技术实现,但生存性在不同技术和动态环境下的能力是不一样的,根据生存性能力高低可以将其划分成若干等级。用户在向信息系统提交业务时需要根据生存性等级来支付费用,而经营者为达到相应的生存性等级必须付诸一定的投资,因此,经营者迫切希望能够找到一种提升方法,以自身的收益来决定信息系统应该具备的生存性等级。通过对信息系统经营者和用户之间的博弈行为及收益分析,构建了博弈模型,并对混合策略下的纳什均衡进行了求解,并根据收益最大化原则设计了经营者是否提升信息系统生存性等级的控制策略。最后在一个生存性被划分为5个等级的信息系统上进行了仿真实验,计算结果表明所提出的博弈模型及生存性提升方法是合理、可行的。 The current study of survivability of information system is focused on the technique realization of quantitatively analysis and guarantee of survivability in static environments.The survivability is different with various techniques in dynamic work conditions,which can be classified into multiple grades according to corresponding capability.Custom needs to pay different service fee at different survivability grade in an information system.At the same time provider must invest considerable money so as to keep a particular survivability grade.An approach has to be proposed urgently,with which the provider can decide whether to promote the survivability grade by his income.A game-theory based model was constructed in this paper by analyzing the action and income of customer and provider who act as the two players.The mixed strategy Nash equilibrium were derived from the model and the strategy for promoting survivability grade was devised,with which the income of provider can be maximized.An experiment was carried out in an information system simulated by 5 survivability grades and the results show that the game-theory based approach presented in the paper is correct and reasonable.
出处 《计算机科学》 CSCD 北大核心 2010年第9期81-84,共4页 Computer Science
基金 国家自然科学基金面上项目(60970121) 国家科技人员服务企业行动项目(2009GJG00025) 西安交通大学科研基金项目(XJ20090511)资助
关键词 信息系统 生存性提升 博弈论 Information system Survivability promotion Game-theory
  • 相关文献

参考文献7

  • 1Ellison R J,Fisher D A,Lingers R C,et al.Survivable Network System:An Emerging Discipline[R].CMU/SEI-97-TR-013.Carnegie Mellon University,1997.
  • 2Moitra Soumyo D,Konda Suresh L.A Simulation Model forManaging Survivability of Networked Information Systems[R].CMU/SEI-2000-TR-020.2005.
  • 3Gao Zhi-xing,Ong Chen-hui,Tan Woon-kiong.Survivability Assessment:Modelling Dependencies in Information Systems[C] ∥The 4th IEEE/CMU/SEI Information Survivability Workshop(ISW-2001/2002).Vancouver,BC Canada,October 2001.
  • 4Lu Tun,Gu Ning.Survivability-Aware Configuration Manage-ment of Service-Oriented System Based on Service Dependency[C] ∥IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering(TASE'07).2007.
  • 5Wang Jian,Wang Hui-qiang,Zhao Guo-sheng.ERAS-an Emergency Response Algorithm for Survivability of Critical Ser-vices[C] ∥Proceedings of the First International Multi-Sympo-siums on Computer and Computational Sciences(IMSCCS'06).2006.
  • 6田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938. 被引量:70
  • 7Bell M.The use of game theory to measure the vulnerability of stochastic networks[J].IEEE Transaction on Reliability,2003,52(1):63-68.

二级参考文献13

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Ruohomaa S,Kutvonen L.Trust management survey//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:77-92
  • 3Theodorakopoulos,George,Baras,John S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
  • 4Pal P,Webber F,Atighetchi M,Combs N.Trust assessment from observed behavior:Toward and essential service for trusted network computing//Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2006:285-292
  • 5Ciaran B,Karl K,Jean-Marc S,Vinny C.Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:289-304
  • 6Tian Li-Qin,Lin Chuang,Ji Tie-Guo.Kind of quantitative evaluation of user behaviour trust using AHP.Journal of Computational Information Systems,2007,3(4):1329-1334
  • 7Lin Ai-Zhong,Vullings E,Dalziel J.A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops.Changsha,China,2006:557-564
  • 8Bell M.The use of game theory to measure the vulnerability of stochastic networks.IEEE Transactions on Reliability,2003,52(1):63-68
  • 9Bertino E,Squicciarini A C,Martino L,Paci F.An adaptive access control model for web services.International Journal of Web Services Research,2006,3(3):27-60
  • 10Hassan T,Morteza A,Rasool J.Trust-based user-role assignment in role-based access control//Proceedings of the AICCSA.Amman,Jordan,2007:807-814

共引文献69

同被引文献16

引证文献2

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部