Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of ...Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of practice of their prescriptive authority in certain circumstances.The results of this study could serve as a reference for the development of policies on prescriptive authority for midwives.Methods:Based on a literature search and semistructured interviews,a modified Delphi method was first used to conduct 2 rounds of expert consultation on eligibility criteria and training content for prescriptive authority for midwives.This stage included nursing experts(20)and medical experts(16)engaged in midwifery in many tertiary Grade A hospitals in China.Subsequently,consultation on the scope of practice of prescriptive authority for midwives was conducted with nursing experts(18)and medical experts(14)engaged in midwifery in many tertiary Grade A hospitals in China.The suggestions from the experts were analyzed using statistical methods to confirm the eligibility criteria for prescriptive authority,training content,circumstances,scope of practice for prescriptive authority,and the prescription forms.Results:Among the consulted experts,70.59%(the highest acceptance rate)considered an undergraduate degree to be the minimum educational requirement for midwives to be eligible for prescriptive authority,85.29%(the highest acceptance rate)considered the supervisor nurse to be the minimum technical position experience necessary for midwives to be eligible for having prescriptive authority,and 50%(the highest acceptance rate)considered 5 years to be the minimum number of years of experience in the specialty for midwives to be eligible for prescriptive authority.The applicants should at least be practicing at Grade C hospitals,which was the consensus among 91.18%of the consulted experts.Among the consulted experts,100%,100%,97.06%,94.12%,and 94.12%agreed that the applicants should have knowledge in pharmacology,laws and ethics,nursing,diagnostics,and midwifery,respectively.The consulted experts confirmed 22 related course topics and identified 6 specific circumstances in which the midwives could partially practice prescriptive authority,including uterine atony,excessive uterine contraction,postpartum hemorrhage,premature rupture of fetal membranes,normal labor,and neonatal asphyxia.Under these 6 circumstances,the consulted experts commonly agreed that there were 20 medication prescriptions and 13 auxiliary examination prescriptions that could be prescribed by midwives.Of these prescriptions,51.5%were independent prescriptions,30.3%were protocol prescriptions,and the remaining 18.2%were both independent and protocol prescriptions.Conclusions:Midwives who have an undergraduate degree,supervisor nurse position,and 5 years of practice in Grade C hospitals are considered eligible to apply for prescriptive authority.Partial prescriptive authority could be granted after regulated training in fundamental theories and practices,which could improve the independence and professionalism of midwifery.展开更多
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut...This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.展开更多
The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the dat...The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the data collected and analyzed, the mean annual temperature and mean annual maximum temperature demonstrated pronounced temporal increasing trend in the period 1951-2010 while the mean annual minimum temperature showed no trend. The rate of increase in mean annual temperature, mean annual maximum and minimum temperatures was 0.45°C, 0.40°C and 0.20°C respectively. The mean annual maximum temperature warmed faster than the mean annual minimum leading to increase in diurnal range of temperature. The annual temperature anomaly in the study area tracks the observed anomalies for the Northern Hemisphere in the 20th century. The decadal temperature increase is very small particularly as from 1980.展开更多
When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental con...When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental concerns can be achieved;the semantic expression of environmental regulation can be expounded.Additionally,through the codification of environmental law,a revolutionary path for the structure of authority can be found.Environmental codification dictates a method for clarification of the boundaries and relations of environmental management authority.Under the theory of Holistic Governance and in the codification process,the reform of environmental regulation authority should be concluded from both vertical and horizontal dimensions,through organizing,integrating,separating,classifying and finally,by establishing a synergy between the central and local governments and their departments.This can break down structural barriers to communication and cooperation of the ecological regulation and resource management authority and help establish uniformity of environmental regulation.展开更多
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ...An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.展开更多
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru...The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.展开更多
The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according...The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according to her behaviors,which reflects her resistance to man authority.展开更多
System of villagers autonomy is one of the basic political systems in China and one of those systems ensuring that the people are the masters of the country. Northwest minorities generally live in the remote northwest...System of villagers autonomy is one of the basic political systems in China and one of those systems ensuring that the people are the masters of the country. Northwest minorities generally live in the remote northwestern China where economy and education are relatively underdeveloped compared with those in central and eastern China and civil authority has great influence on rural grass-roots democracy as well as social autonomy there,which causes difficulties to the development of rural democracy and social autonomy. Assisting northwest minority regions in overcoming the difficulties of developing grass-roots democracy and social autonomy,carrying out effective measures to properly guide the development and influence of civil authority and finally achieving the construction of new socialist countryside have great significance in ensuring that people there are the masters of their country.展开更多
Using 70 years of daily rainfall records in eight stations, an analysis of variability and trends of daily heavy rainfall events over Niger River Basin Development Authority Area was carried out by using Standardized ...Using 70 years of daily rainfall records in eight stations, an analysis of variability and trends of daily heavy rainfall events over Niger River Basin Development Authority Area was carried out by using Standardized Anomaly Index and Spearman Rank Correlation Coefficient. Significant temporal variability on interannual and decadal time-scales was observed in the frequency of heavy rainfall events and annual heavy rainfall amount. Both the annual heavy rainfall amount and frequency of heavy rainfall events demonstrated no pronounced temporal decreasing or increasing trend. However, more recent data records from 1981 onwards revealed an increasing trend. Thus, evidence of a temporal change is apparent in heavy rainfall events in the last three decades in sympathy with global warming.展开更多
How should the rural governance order be reconstructed centered on the new authority elements after the collapse of traditional rural governance order with the core of family authority, gentry authority and regime? Th...How should the rural governance order be reconstructed centered on the new authority elements after the collapse of traditional rural governance order with the core of family authority, gentry authority and regime? This is a major problem in the construction of new rural areas of contemporary China. This paper attempts to present a historical picture of the inversely proportional relationship between elements like regime, family authority, gentry authority, financial power, political power, civil rights, and so on, based on review of the change path of rural area governance order tracing back to traditional period, the period of the Republic of China, years before the founding of new China as well as period after reform and opening up. It is believed that"innovations"and"heritages"of traditions must be investigated in the transformation process for the rebuilding of a set of stable and reasonable governance order for rural areas, instead of cutting facts by a certain theory or design. In addition, the actual weight of every authority element in social structure and order in people’s mind should be faced up with, which should be integrated with"regulation"and"virtue".展开更多
Polymetallic sulphides have been consistent source of metals like iron, copper, zinc and lead. Apart from these they are also seen as economically viable resources of silver and gold. As the demand of these metals is ...Polymetallic sulphides have been consistent source of metals like iron, copper, zinc and lead. Apart from these they are also seen as economically viable resources of silver and gold. As the demand of these metals is showing an astoundingly increasing trend, the search for their resources has also increased in similar folds. This has resulted in many nations' focus on deep seabed resources of the polymetallic sulphides. Consequently, International Seabed Authority (ISBA) has provided 'Regulations' to obtain plan of work for exploration of polymetallic sulphide deposits in deep seabed 'Area'. Following the release of these Regulations, several countries are in the process of obtaining the licence for exploration of these metals from the deep seabed regions. Detailed information about the science and ISBA Regulations for exploration of polymetallic sulphide deposits is prerequisite to submit an application to ISBA for their exploration. The current contribution provides a comprehensive review of the science behind locating polymetallic sulphide deposits in geological setting of deep seabed as well as about the ISBA Regulations for their exploration.展开更多
The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction proj...The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service.展开更多
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa...Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.展开更多
Over the past decade many point solutions to specific cyberspace security problems have becomeavailable. Nevertheless a comprehensive approach to architecting security in an organization’s informationsystems remains ...Over the past decade many point solutions to specific cyberspace security problems have becomeavailable. Nevertheless a comprehensive approach to architecting security in an organization’s informationsystems remains an elusive goal. This talk will describe an approach to meeting this goal and will identifyproblem areas that need to be solved to achieve this展开更多
Political legitimacy is the question about how a regime could be stable and lasting. Max Weber, a scholar, defined legitimacy earliest and carried out a systematic study in the history. He divided the legitimate autho...Political legitimacy is the question about how a regime could be stable and lasting. Max Weber, a scholar, defined legitimacy earliest and carried out a systematic study in the history. He divided the legitimate authority into traditional authority, authority of charisma and authority of legal theory. This paper is just based upon authority rules of the three types, and discusses the organization's establishment, operational and managerial characteristics under the three kinds of authority. It is expected to provide references for reform of the administrative system.展开更多
I Stand Here Ironing is Tillie Olsen’s first novel of her back to writing after several years’silence.It reflects the real living condition of marginalized women through the description of a daughter by the mother’...I Stand Here Ironing is Tillie Olsen’s first novel of her back to writing after several years’silence.It reflects the real living condition of marginalized women through the description of a daughter by the mother’s memories.Based on Susan S.Lanser’s distinction of three modes of narrative voice in feminist narratology,this paper analyzes three narrative voices in this novel.Olsen employs multiple narrative voices in the novel in order to release the voice of the marginalized women in the silence,she destroys the male’s authority and constructs the discourse authority of silent,poor working-class women.展开更多
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ...The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).展开更多
Sokoto Emirate was one of the three(later four)constituent emirates in colonial Sokoto Province,Northern Nigeria.The others being Sokoto,Gwandu,Argungu,and Yauri Emirates.It is located at the northwestern most part of...Sokoto Emirate was one of the three(later four)constituent emirates in colonial Sokoto Province,Northern Nigeria.The others being Sokoto,Gwandu,Argungu,and Yauri Emirates.It is located at the northwestern most part of Nigeria.The Sokoto Emirate covers the present day Sokoto and Zamfara states of Nigeria.During the British colonial administration,native authority(NA)system was a model of local government administration created under the“indirect rule system”.It was a system where by the pre-colonial traditional leadership institutions were modified and allowed to function in the local government administration introduced by the British.This paper assessed the role played by traditional leadership institutions in addressing security challenges during the British colonial administration of Sokoto Emirate.In particular,the role played by the NA in arresting Mahdist uprisings,and other related extremist religious movements on the one hand,as well as rural banditry,armed robbery,theft,among other security challenges in the emirate,are highlighted.The paper further argued that some of the roles played by the traditional leadership institutions in successfully addressing those challenges are still relevant in addressing the problems of insurgency on the one hand,and some of the recent emerging security challenges,in northwestern Nigeria,such as cattle rustling,rural banditry,kidnappings,robbery,and other related challenges.展开更多
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p...This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.展开更多
基金project was supported by the Shanxi Province Soft Science Research Program in China(No.2017041041-1)
文摘Objective:To investigate the necessary eligibility criteria for prescriptive authority for midwives,gather suggestions from experts on training content for prescriptive authority for midwives,and explore the scope of practice of their prescriptive authority in certain circumstances.The results of this study could serve as a reference for the development of policies on prescriptive authority for midwives.Methods:Based on a literature search and semistructured interviews,a modified Delphi method was first used to conduct 2 rounds of expert consultation on eligibility criteria and training content for prescriptive authority for midwives.This stage included nursing experts(20)and medical experts(16)engaged in midwifery in many tertiary Grade A hospitals in China.Subsequently,consultation on the scope of practice of prescriptive authority for midwives was conducted with nursing experts(18)and medical experts(14)engaged in midwifery in many tertiary Grade A hospitals in China.The suggestions from the experts were analyzed using statistical methods to confirm the eligibility criteria for prescriptive authority,training content,circumstances,scope of practice for prescriptive authority,and the prescription forms.Results:Among the consulted experts,70.59%(the highest acceptance rate)considered an undergraduate degree to be the minimum educational requirement for midwives to be eligible for prescriptive authority,85.29%(the highest acceptance rate)considered the supervisor nurse to be the minimum technical position experience necessary for midwives to be eligible for having prescriptive authority,and 50%(the highest acceptance rate)considered 5 years to be the minimum number of years of experience in the specialty for midwives to be eligible for prescriptive authority.The applicants should at least be practicing at Grade C hospitals,which was the consensus among 91.18%of the consulted experts.Among the consulted experts,100%,100%,97.06%,94.12%,and 94.12%agreed that the applicants should have knowledge in pharmacology,laws and ethics,nursing,diagnostics,and midwifery,respectively.The consulted experts confirmed 22 related course topics and identified 6 specific circumstances in which the midwives could partially practice prescriptive authority,including uterine atony,excessive uterine contraction,postpartum hemorrhage,premature rupture of fetal membranes,normal labor,and neonatal asphyxia.Under these 6 circumstances,the consulted experts commonly agreed that there were 20 medication prescriptions and 13 auxiliary examination prescriptions that could be prescribed by midwives.Of these prescriptions,51.5%were independent prescriptions,30.3%were protocol prescriptions,and the remaining 18.2%were both independent and protocol prescriptions.Conclusions:Midwives who have an undergraduate degree,supervisor nurse position,and 5 years of practice in Grade C hospitals are considered eligible to apply for prescriptive authority.Partial prescriptive authority could be granted after regulated training in fundamental theories and practices,which could improve the independence and professionalism of midwifery.
文摘This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.
文摘The study investigates the trends in temperature in the Upper and Lower Niger Basin Development Authority Areas using standardized Anomaly Index, Gaussian Low Pass and Spearman’s correlation coefficient. From the data collected and analyzed, the mean annual temperature and mean annual maximum temperature demonstrated pronounced temporal increasing trend in the period 1951-2010 while the mean annual minimum temperature showed no trend. The rate of increase in mean annual temperature, mean annual maximum and minimum temperatures was 0.45°C, 0.40°C and 0.20°C respectively. The mean annual maximum temperature warmed faster than the mean annual minimum leading to increase in diurnal range of temperature. The annual temperature anomaly in the study area tracks the observed anomalies for the Northern Hemisphere in the 20th century. The decadal temperature increase is very small particularly as from 1980.
文摘When developing and integrating a new environmental legal system under the Environmental Code,the joint regulation of ecology and environment,natural resources and an energy beyond the sphere of mere environmental concerns can be achieved;the semantic expression of environmental regulation can be expounded.Additionally,through the codification of environmental law,a revolutionary path for the structure of authority can be found.Environmental codification dictates a method for clarification of the boundaries and relations of environmental management authority.Under the theory of Holistic Governance and in the codification process,the reform of environmental regulation authority should be concluded from both vertical and horizontal dimensions,through organizing,integrating,separating,classifying and finally,by establishing a synergy between the central and local governments and their departments.This can break down structural barriers to communication and cooperation of the ecological regulation and resource management authority and help establish uniformity of environmental regulation.
基金Supported by the National Natural Science Foundation of China(No.60970111,60903189,60903020)the National High Technology Research and Development Programme of China(No.2009AA012418)+1 种基金the National Basic Research Program of China(No.2007CB311201)the Foundation of NLMC(No.9140C1103020803)
文摘An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
基金Projects(61472192,61202004)supported by the National Natural Science Foundation of ChinaProject(14KJB520014)supported by the Natural Science Fund of Higher Education of Jiangsu Province,China
文摘The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
文摘The Thorn Birds is a saga novel written by Colleen McCullough.Its story is about the deep love between Meggie and Father Ralph.This paper mainly analyzes Meggie's sensitive but persistent characteristics according to her behaviors,which reflects her resistance to man authority.
基金Supported by the Social Sciences Planning Project Launched by Ministry of Education of China in 2011-Study on the Informal Institutional Implementation and the Coordinated Development between Economy and Society in the Northwest Minority Areas(11YJA710005)China Scholarship Council([2012]5030)+1 种基金Professor Andrew J.Nathan,Weatherhead East Asian Insti-tute of Columbia UniversityJames D.Seymour,Adjunct Associate Professor at Chinese University of Hong Kong
文摘System of villagers autonomy is one of the basic political systems in China and one of those systems ensuring that the people are the masters of the country. Northwest minorities generally live in the remote northwestern China where economy and education are relatively underdeveloped compared with those in central and eastern China and civil authority has great influence on rural grass-roots democracy as well as social autonomy there,which causes difficulties to the development of rural democracy and social autonomy. Assisting northwest minority regions in overcoming the difficulties of developing grass-roots democracy and social autonomy,carrying out effective measures to properly guide the development and influence of civil authority and finally achieving the construction of new socialist countryside have great significance in ensuring that people there are the masters of their country.
文摘Using 70 years of daily rainfall records in eight stations, an analysis of variability and trends of daily heavy rainfall events over Niger River Basin Development Authority Area was carried out by using Standardized Anomaly Index and Spearman Rank Correlation Coefficient. Significant temporal variability on interannual and decadal time-scales was observed in the frequency of heavy rainfall events and annual heavy rainfall amount. Both the annual heavy rainfall amount and frequency of heavy rainfall events demonstrated no pronounced temporal decreasing or increasing trend. However, more recent data records from 1981 onwards revealed an increasing trend. Thus, evidence of a temporal change is apparent in heavy rainfall events in the last three decades in sympathy with global warming.
基金Beijing Social Science Fund Project Research on the Property Ownership of Stock Cooperatives in the Suburbs of Beijing(13SHC029)Beijing Zheng Hangsheng Social Development FundThe initial result of the special doctoral student project of Perfect China Co.,Ltd.Research on China’s Present Property Ownership of Rural Stock Cooperatives
文摘How should the rural governance order be reconstructed centered on the new authority elements after the collapse of traditional rural governance order with the core of family authority, gentry authority and regime? This is a major problem in the construction of new rural areas of contemporary China. This paper attempts to present a historical picture of the inversely proportional relationship between elements like regime, family authority, gentry authority, financial power, political power, civil rights, and so on, based on review of the change path of rural area governance order tracing back to traditional period, the period of the Republic of China, years before the founding of new China as well as period after reform and opening up. It is believed that"innovations"and"heritages"of traditions must be investigated in the transformation process for the rebuilding of a set of stable and reasonable governance order for rural areas, instead of cutting facts by a certain theory or design. In addition, the actual weight of every authority element in social structure and order in people’s mind should be faced up with, which should be integrated with"regulation"and"virtue".
文摘Polymetallic sulphides have been consistent source of metals like iron, copper, zinc and lead. Apart from these they are also seen as economically viable resources of silver and gold. As the demand of these metals is showing an astoundingly increasing trend, the search for their resources has also increased in similar folds. This has resulted in many nations' focus on deep seabed resources of the polymetallic sulphides. Consequently, International Seabed Authority (ISBA) has provided 'Regulations' to obtain plan of work for exploration of polymetallic sulphide deposits in deep seabed 'Area'. Following the release of these Regulations, several countries are in the process of obtaining the licence for exploration of these metals from the deep seabed regions. Detailed information about the science and ISBA Regulations for exploration of polymetallic sulphide deposits is prerequisite to submit an application to ISBA for their exploration. The current contribution provides a comprehensive review of the science behind locating polymetallic sulphide deposits in geological setting of deep seabed as well as about the ISBA Regulations for their exploration.
文摘The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service.
文摘Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.
文摘Over the past decade many point solutions to specific cyberspace security problems have becomeavailable. Nevertheless a comprehensive approach to architecting security in an organization’s informationsystems remains an elusive goal. This talk will describe an approach to meeting this goal and will identifyproblem areas that need to be solved to achieve this
文摘Political legitimacy is the question about how a regime could be stable and lasting. Max Weber, a scholar, defined legitimacy earliest and carried out a systematic study in the history. He divided the legitimate authority into traditional authority, authority of charisma and authority of legal theory. This paper is just based upon authority rules of the three types, and discusses the organization's establishment, operational and managerial characteristics under the three kinds of authority. It is expected to provide references for reform of the administrative system.
文摘I Stand Here Ironing is Tillie Olsen’s first novel of her back to writing after several years’silence.It reflects the real living condition of marginalized women through the description of a daughter by the mother’s memories.Based on Susan S.Lanser’s distinction of three modes of narrative voice in feminist narratology,this paper analyzes three narrative voices in this novel.Olsen employs multiple narrative voices in the novel in order to release the voice of the marginalized women in the silence,she destroys the male’s authority and constructs the discourse authority of silent,poor working-class women.
基金supported by the National Natural Science Foundation of China(6120200461472192)+1 种基金the Special Fund for Fast Sharing of Science Paper in Net Era by CSTD(2013116)the Natural Science Fund of Higher Education of Jiangsu Province(14KJB520014)
文摘The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).
文摘Sokoto Emirate was one of the three(later four)constituent emirates in colonial Sokoto Province,Northern Nigeria.The others being Sokoto,Gwandu,Argungu,and Yauri Emirates.It is located at the northwestern most part of Nigeria.The Sokoto Emirate covers the present day Sokoto and Zamfara states of Nigeria.During the British colonial administration,native authority(NA)system was a model of local government administration created under the“indirect rule system”.It was a system where by the pre-colonial traditional leadership institutions were modified and allowed to function in the local government administration introduced by the British.This paper assessed the role played by traditional leadership institutions in addressing security challenges during the British colonial administration of Sokoto Emirate.In particular,the role played by the NA in arresting Mahdist uprisings,and other related extremist religious movements on the one hand,as well as rural banditry,armed robbery,theft,among other security challenges in the emirate,are highlighted.The paper further argued that some of the roles played by the traditional leadership institutions in successfully addressing those challenges are still relevant in addressing the problems of insurgency on the one hand,and some of the recent emerging security challenges,in northwestern Nigeria,such as cattle rustling,rural banditry,kidnappings,robbery,and other related challenges.
文摘This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.