{"id":"https://openalex.org/W4210472683","doi":"https://doi.org/10.1109/globecom46510.2021.9685619","title":"A Dynamic Access Control Model Based on Game Theory for the Cloud","display_name":"A Dynamic Access Control Model Based on Game Theory for the Cloud","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210472683","doi":"https://doi.org/10.1109/globecom46510.2021.9685619"},"language":"en","primary_location":{"id":"doi:10.1109/globecom46510.2021.9685619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685619","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012359187","display_name":"Pengfei Shao","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengfei Shao","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","GuangDong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"GuangDong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020529014","display_name":"Shuyuan Jin","orcid":"https://orcid.org/0000-0003-2087-2853"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuyuan Jin","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","GuangDong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"GuangDong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012359187"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.5017,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66521911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7427141666412354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6972293853759766},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6864601373672485},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5292811989784241},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43656009435653687},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.42440199851989746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39240050315856934},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3557167649269104},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18627861142158508},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.18206095695495605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11982369422912598},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10052147507667542}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7427141666412354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6972293853759766},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6864601373672485},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5292811989784241},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43656009435653687},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.42440199851989746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39240050315856934},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3557167649269104},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18627861142158508},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.18206095695495605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11982369422912598},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10052147507667542}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom46510.2021.9685619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685619","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W131755067","https://openalex.org/W1594706025","https://openalex.org/W1604936042","https://openalex.org/W1972910244","https://openalex.org/W1988818093","https://openalex.org/W1990134676","https://openalex.org/W1997199359","https://openalex.org/W1997722202","https://openalex.org/W2032369304","https://openalex.org/W2062493711","https://openalex.org/W2150475910","https://openalex.org/W2162022335","https://openalex.org/W2168903925","https://openalex.org/W2318224047","https://openalex.org/W2322860310","https://openalex.org/W2369295637","https://openalex.org/W2507823137","https://openalex.org/W2549989740","https://openalex.org/W2600005180","https://openalex.org/W2612172766","https://openalex.org/W2786962131","https://openalex.org/W2791361198","https://openalex.org/W3044224066","https://openalex.org/W3082763624","https://openalex.org/W4231611411","https://openalex.org/W4234761190","https://openalex.org/W4236158019","https://openalex.org/W6729497260","https://openalex.org/W6748499452","https://openalex.org/W6781216415","https://openalex.org/W6783006446"],"related_works":["https://openalex.org/W2552828156","https://openalex.org/W2071306797","https://openalex.org/W2405803446","https://openalex.org/W2374666693","https://openalex.org/W2911145752","https://openalex.org/W1987421962","https://openalex.org/W2149560990","https://openalex.org/W2372443802","https://openalex.org/W2363987469","https://openalex.org/W1517532457"],"abstract_inverted_index":{"The":[0],"user&#x0027;s":[1,64,92,142],"access":[2,19,31,84,130,146],"history":[3],"can":[4],"be":[5],"used":[6],"as":[7,79,86],"an":[8],"important":[9],"reference":[10],"factor":[11],"in":[12,66],"determining":[13],"whether":[14],"to":[15,61],"allow":[16],"the":[17,29,53,63,67,83,91,96,99,118,122,129,134,137,141,149],"current":[18],"request":[20,131],"or":[21],"not.":[22],"And":[23],"it":[24],"is":[25,49,110,125],"often":[26],"ignored":[27],"by":[28,121],"existing":[30],"control":[32],"models.":[33],"To":[34],"make":[35,157],"up":[36],"for":[37,117,160],"this":[38,154],"defect,":[39],"a":[40,59,87,114,144,158],"Dynamic":[41],"Trust":[42],"-":[43],"game":[44,88],"theoretic":[45],"Access":[46],"Control":[47],"model":[48],"proposed":[50],"based":[51],"on":[52,133],"previous":[54],"work.":[55,162],"This":[56],"paper":[57,155],"proposes":[58],"method":[60,116],"quantify":[62],"trust":[65,78,93],"cloud":[68,105],"environment,":[69],"which":[70],"uses":[71],"identity":[72],"trust,":[73,75],"behavior":[74],"and":[76,89,107,156],"reputation":[77],"metrics.":[80],"By":[81],"modeling":[82],"process":[85],"introducing":[90],"value":[94],"into":[95],"pay-off":[97],"matrix,":[98],"mixed":[100],"strategy":[101],"Nash":[102],"equilibrium":[103],"of":[104,128,136,140],"user":[106],"service":[108,123],"provider":[109,124],"calculated":[111,138],"respectively.":[112],"Further,":[113],"calculation":[115],"threshold":[119],"predefined":[120],"proposed.":[126],"Authorization":[127],"depends":[132],"comparison":[135],"probability":[139],"adopting":[143],"malicious":[145],"policy":[147],"with":[148],"threshold.":[150],"Finally,":[151],"we":[152],"summarize":[153],"prospect":[159],"future":[161]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
