An Analysis on the Inconsistency of the Security Supervision Policy in the Method of Game Theory

被引:0
|
作者
WANG Xing-yu 1
Administrative College
2.College of Mathematics and Information Science
机构
关键词
security; supervision policy; game;
D O I
暂无
中图分类号
O175.13 [稳定性理论];
学科分类号
摘要
This article expounds and proves the basic model of the inconsistency of the security supervision policy and makes an analysis in the method of game theory on the inconsistency of the security transaction-tax-rate policy, concludes that the security supervision department is inclined to increase or decrease the security transaction tax rate, thus points out ways for supervision department to surmount this difficulty.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 50 条
  • [1] Inconsistency Analysis of Time-Based Security Policy and Firewall Policy
    Yin, Yi
    Tateiwa, Yuichiro
    Wang, Yun
    Katayama, Yoshiaki
    Takahashi, Naohisa
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 447 - 463
  • [2] The game analysis of public participation in food security supervision
    Zaohong, Zhou
    Huiyuan, Qin
    Advance Journal of Food Science and Technology, 2013, 5 (03) : 323 - 327
  • [3] An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver
    Yin, Yi
    Tateiwa, Yuichiro
    Wang, Yun
    Katayama, Yoshiaki
    Takahashi, Naohisa
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 147 - 161
  • [4] Model for Coal Mine and Security Supervision Sector Based on Game Theory
    Wang, Qing Song
    Qin, Li
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 3, 2009, : 291 - 295
  • [5] Analysis of Food Safety Supervision Based on Game Theory
    Tong Guang-ji
    Zhu Guang-qin
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (4TH), VOL II, 2008, : 512 - 517
  • [6] Analysis based on game theory for construction safety supervision
    Wang Jin
    Li Zhun
    Wang Dongmei
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL 6, PTS A AND B, 2006, 6 : 263 - 266
  • [7] Security coalition method based on game theory
    Huang, Kai-Zhi
    Hong, Ying
    Luo, Wen-Yu
    Lin, Sheng-Bin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (07): : 1562 - 1568
  • [8] The usefulness of game theory as a method for policy evaluation
    Hermans, Leon
    Cunningham, Scott
    Slinger, Jill
    EVALUATION, 2014, 20 (01) : 10 - 25
  • [9] The game security and security game: hacking, law and public policy
    McMullan, John L.
    Perrier, David C.
    CRIMINOLOGIE, 2006, 39 (01) : 83 - 106
  • [10] An Analysis of Voidance of Policy Under Game Theory
    范建刚
    樊花
    陕西师范大学学报(哲学社会科学版), 2006, (S1) : 350 - 352