By Topic

Modeling and Performance Analysis of User Behavior Authentication Using Stochastic Petri Nets

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chen Ya-rui ; Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China ; Tian Li-qin

Conventional network security control and protective measures based on identity authentication and content authentication can't meet the security requirement of current cloud computing. To address this problem, a behavior authentication mechanism is proposed, which includes establishment of behavior authentication set and behavior authentication strategy. A stochastic Petri net model for this mechanism is constructed. We solve the model by using top-down decomposition and bottom-up hierarchical analysis techniques to decrease the complexity of the model and underling Markov process. This paper further conducts performance evaluation of the system. The research results provide a reference for the design and application of a practical behavior authentication mechanism.

Published in:

Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on

Date of Conference:

23-25 Aug. 2012