2018
DOI: 10.1007/978-3-319-75268-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Security and Interdependency in a Public Cloud: A Game-Theoretic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Various game methods have been developed to study the privacy strategy selection between proctors and adversaries. Kamhoua et al [21] studied the security of cloud computing participants and internal interdependence, analyzed many possible Nash equilibria, and described the adversary's motivation more accurately. In order to study heterogeneous network system and provide the optimal security detection strategy, Wu et al [22] gave the analysis of Bayesian equilibrium and robust Nash equilibrium with incomplete information and proposed a verification and calculation method for continuous kernels.…”
Section: Game Strategy Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various game methods have been developed to study the privacy strategy selection between proctors and adversaries. Kamhoua et al [21] studied the security of cloud computing participants and internal interdependence, analyzed many possible Nash equilibria, and described the adversary's motivation more accurately. In order to study heterogeneous network system and provide the optimal security detection strategy, Wu et al [22] gave the analysis of Bayesian equilibrium and robust Nash equilibrium with incomplete information and proposed a verification and calculation method for continuous kernels.…”
Section: Game Strategy Selectionmentioning
confidence: 99%
“…To further show the characteristics and advantages of our study, the related results of comparison with other works of literature are shown in Table 6. In [8,21], the participants are completely rational, but because of the participants' incomplete rationality in the implementation, the feasibility of the model is reduced. Literature [17] and literature [18] are evolutionary game models, but the process of solving the model is simple.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Interdependencies or interlinkages are crucial in many research domains such as physiology (Klein et al , 1986), development and inequality analysis (Chotia and Rao, 2017), power system security (Li et al , 2008), information technology security (Kamhoual et al , 2018) and finance (Diebold and Yilmaz, 2014; Härdle et al , 2016; Chan-Lau et al , 2016; Subramaniam and Prasanna, 2017; Cheah et al , 2018). Interdependency among different assets has been one key factor in the context of portfolio allocation and risk management for a long time.…”
Section: Introductionmentioning
confidence: 99%