{"citation":{"chicago":"Chatterjee, Krishnendu, Rhada Jagadeesan, and Corin Pitcher. “Games for Controls,” 70–82. IEEE, 2006. https://doi.org/10.1109/CSFW.2006.14.","apa":"Chatterjee, K., Jagadeesan, R., & Pitcher, C. (2006). Games for controls (pp. 70–82). Presented at the CSF: Computer Security Foundations, IEEE. https://doi.org/10.1109/CSFW.2006.14","ista":"Chatterjee K, Jagadeesan R, Pitcher C. 2006. Games for controls. CSF: Computer Security Foundations, 70–82.","mla":"Chatterjee, Krishnendu, et al. Games for Controls. IEEE, 2006, pp. 70–82, doi:10.1109/CSFW.2006.14.","short":"K. Chatterjee, R. Jagadeesan, C. Pitcher, in:, IEEE, 2006, pp. 70–82.","ama":"Chatterjee K, Jagadeesan R, Pitcher C. Games for controls. In: IEEE; 2006:70-82. doi:10.1109/CSFW.2006.14","ieee":"K. Chatterjee, R. Jagadeesan, and C. Pitcher, “Games for controls,” presented at the CSF: Computer Security Foundations, 2006, pp. 70–82."},"extern":1,"date_published":"2006-07-31T00:00:00Z","quality_controlled":0,"title":"Games for controls","day":"31","publisher":"IEEE","month":"07","year":"2006","publist_id":"2938","date_updated":"2021-01-12T07:43:32Z","abstract":[{"lang":"eng","text":"We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), accountability based controls (e.g., insurance), controls derived from rationality assumptions on participants (e.g., network mechanisms), and their composition. Building on the extensive research into games, we demonstrate that this expressive power coexists with a formal analysis framework comparable to that available for access control."}],"date_created":"2018-12-11T12:03:23Z","status":"public","author":[{"first_name":"Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","full_name":"Krishnendu Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Jagadeesan, Rhada","last_name":"Jagadeesan","first_name":"Rhada"},{"first_name":"Corin","last_name":"Pitcher","full_name":"Pitcher, Corin"}],"conference":{"name":"CSF: Computer Security Foundations"},"publication_status":"published","_id":"3449","page":"70 - 82","type":"conference","doi":"10.1109/CSFW.2006.14"}