×
Abstract: The user's access history can be used as an important reference factor in determining whether to allow the current access request or not.
People also ask
Abstract—The user's access history can be used as an impor- tant reference factor in determining whether to allow the current access request or not.
A method to quantify the user's trust in the cloud environment, which uses identity trust, behavior trust, and reputation trust as metrics, ...
Dec 7, 2021 · This paper proposes a method to quantify the user's trust in the cloud environment, which uses identity trust, behavior trust, and ...
To meet this practical requirement, this paper addresses how to establishes a bridge between role-based access control (RBAC) and cloud storage in order to ...
In section 3, we apply game theory to analyze an original single game playing between subject and object, and get the prisoner's dilemma through Nash ...
Jul 24, 2020 · First, we construct a trust evaluation model based on multiple factors, such as the direct trust, feedback trust, reward punishment, and trust ...
A trust-game-based access control model for cloud service based on multiple factors, such as the direct trust, feedback trust, reward punishment, and trust ...
The proposed model (GTM-CSec) helps the detection system comprising of IDS and Honeypots to intelligently detect attacks. •. A non-cooperative game has been ...
This research tries to provide a pricing mechanism for cloud computing based on game theory. The suggested approach considers three aspects: the likelihood of ...