Title
Game Theory Based Optimization of Security Configuration
Abstract
How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.
Year
DOI
Venue
2007
10.1109/CIS.2007.141
CIS
Keywords
Field
DocType
feedback,non cooperative game,redundancy,game theory,usability,network security,computational intelligence,information security,natural languages
Mathematical optimization,Computational intelligence,Computer science,Usability,Network security,Information security,Redundancy (engineering),Natural language,Game theory,Computer security model,Distributed computing
Conference
Volume
Issue
ISBN
null
null
0-7695-3072-9
Citations 
PageRank 
References 
1
0.39
9
Authors
3
Name
Order
Citations
PageRank
Jin Shi1246.28
Yin Lu210.39
Li Xie3121.65