{"id":"https://openalex.org/W7117317440","doi":"https://doi.org/10.1186/s42400-025-00520-z","title":"Gatac: Research on microservice access control techniques based on trust assessment and game analysis","display_name":"Gatac: Research on microservice access control techniques based on trust assessment and game analysis","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117317440","doi":"https://doi.org/10.1186/s42400-025-00520-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00520-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00520-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00520-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00520-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121319357","display_name":"Zhangwen Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162700","display_name":"Chinese Society for Tropical Crops","ror":"https://ror.org/05x3qxg97","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210162700"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhangwen Li","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China"],"affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China","institution_ids":["https://openalex.org/I4210162700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121303770","display_name":"Xuehui Du","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162700","display_name":"Chinese Society for Tropical Crops","ror":"https://ror.org/05x3qxg97","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210162700"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuehui Du","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China"],"affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China","institution_ids":["https://openalex.org/I4210162700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121307856","display_name":"Xiangyu Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162700","display_name":"Chinese Society for Tropical Crops","ror":"https://ror.org/05x3qxg97","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210162700"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyu Wu","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China"],"affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China","institution_ids":["https://openalex.org/I4210162700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121331643","display_name":"Aodi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162700","display_name":"Chinese Society for Tropical Crops","ror":"https://ror.org/05x3qxg97","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210162700"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aodi Liu","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China"],"affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China","institution_ids":["https://openalex.org/I4210162700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065697745","display_name":"Shihao Wang","orcid":"https://orcid.org/0000-0001-6152-3559"},"institutions":[{"id":"https://openalex.org/I4210162700","display_name":"Chinese Society for Tropical Crops","ror":"https://ror.org/05x3qxg97","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210162700"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shihao Wang","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China"],"affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, 450000, He\u2019nan, China","institution_ids":["https://openalex.org/I4210162700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121319357"],"corresponding_institution_ids":["https://openalex.org/I4210162700"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66141821,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.8652999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.8652999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.03849999979138374,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.010900000110268593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8220000267028809},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.5550000071525574},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.48969998955726624},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.427700012922287},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4187000095844269},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.3986000120639801},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.3741999864578247},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.34290000796318054},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.33719998598098755}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8220000267028809},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7861999869346619},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.5550000071525574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49459999799728394},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.48969998955726624},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.427700012922287},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4187000095844269},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3986000120639801},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.34290000796318054},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2888000011444092},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.2833999991416931},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.2833000123500824},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C2779295839","wikidata":"https://www.wikidata.org/wiki/Q3544090","display_name":"Punishment (psychology)","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00520-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00520-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00520-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a2bdf1272a6046ba9ccaeb6dcb885e48","is_oa":true,"landing_page_url":"https://doaj.org/article/a2bdf1272a6046ba9ccaeb6dcb885e48","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00520-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00520-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00520-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117317440.pdf","grobid_xml":"https://content.openalex.org/works/W7117317440.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1594706025","https://openalex.org/W2063979829","https://openalex.org/W2087834864","https://openalex.org/W2915754873","https://openalex.org/W2965253952","https://openalex.org/W3119029232","https://openalex.org/W3123491145","https://openalex.org/W4210472683","https://openalex.org/W4387826507","https://openalex.org/W4387872721","https://openalex.org/W4389352673","https://openalex.org/W4391594679","https://openalex.org/W4399568751","https://openalex.org/W4401687151","https://openalex.org/W4409816448","https://openalex.org/W4410028055","https://openalex.org/W4412396385"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Microservice":[1],"architecture":[2],"faces":[3],"security":[4,30,55],"issues":[5,50],"due":[6],"to":[7,62,120,139,162],"the":[8,20,28,33,93,102,112,122,149],"large":[9,16],"scale":[10],"of":[11,22,36,126,159],"services,":[12],"resulting":[13],"in":[14,157],"a":[15,72,87,106,128],"attack":[17],"surface.":[18],"Integrating":[19],"concept":[21],"\u201ccontinuous":[23],"authentication,":[24],"never":[25],"trust\u201d":[26],"from":[27],"zero-trust":[29,65],"model":[31,79,103],"into":[32],"access":[34,45,77,100,123,143,154],"control":[35,46,59,78,124,155],"microservices":[37],"has":[38],"been":[39],"extensively":[40],"studied,":[41],"but":[42],"current":[43],"microservice":[44],"mechanisms":[47,156],"still":[48],"face":[49],"like":[51],"poor":[52],"adaptability,":[53],"inadequate":[54],"measures,":[56],"and":[57,76,86,97,133,164],"limited":[58],"capabilities,":[60],"failing":[61],"fully":[63],"implement":[64],"principles.":[66],"In":[67],"response,":[68],"this":[69],"paper":[70],"proposes":[71],"dynamic":[73,96],"trust":[74,107],"evaluation":[75],"named":[80],"GATAC,":[81],"based":[82,131],"on":[83],"machine":[84],"learning":[85],"game-theoretic":[88],"reward-punishment":[89],"algorithm.":[90],"To":[91],"meet":[92],"need":[94],"for":[95],"highly":[98],"accurate":[99],"evaluation,":[101],"first":[104],"introduces":[105],"computation":[108],"method":[109],"that":[110,148],"enhances":[111],"FORBP":[113],"neural":[114],"network":[115],"using":[116],"random":[117],"forest.":[118],"Furthermore,":[119],"improve":[121],"capability":[125],"microservices,":[127],"game":[129],"state":[130],"reward":[132],"punishment":[134],"algorithm":[135],"(MICGA)":[136],"is":[137],"proposed":[138,150],"encourage":[140],"honest":[141],"user":[142],"behaviors.":[144],"Experimental":[145],"results":[146],"indicate":[147],"solution":[151],"outperforms":[152],"existing":[153],"terms":[158],"accuracy,":[160],"resistance":[161],"attacks,":[163],"adaptability.":[165]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-26T00:00:00"}
