On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of Ch...On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.展开更多
On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-Presid...On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.展开更多
At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,vis...At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.展开更多
In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances ...In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.展开更多
At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu J...On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.展开更多
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security...New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.展开更多
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 day... The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 days included technical presentations,social events and the very important Ph.D conference. During the event there were the General Assembly bringing together the organizations members from around the world,and an exhibition,supported by 34 world's leading foundry based companies. In addition the event coincided with the Czech Foundrymens Society Foundry Days now in its 46th year.……展开更多
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c...Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.展开更多
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro...To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.展开更多
Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, Presi...Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, President of China Academy of Machinery Science and Technology, more recently attended the 67th World Foundry Congress, and visited the Royal Institute of Technology, Sweden; LOCOMO Cast Steel Company, Metso Corporation, Finland; Imperial College, London, United Kingdom; and Brunel University, United Kingdom. During the period of the Congress and in the course of visiting, the delegation had deeply technical exchanges with the organizations mentioned above in the fields of such technologies as numerical simulation and design of foundry technical processes, special materials and advanced casting technology for hydraulic turbines and steam turbines, dual-phase steels casting, nuclear shielding materials manufacturing, rheology and semi-solid casting technology, design and development of medium-frequency induction heating furnaces and so on. Both of them are on the chance of cooperation. The visiting of the delegation is quite successful. The 69th World Foundry Congress has been determined by World Foundry Organization to be held in China and it will be organized by Foundry Institution of Chinese Mechanical Engineering Society and China Academy of Machinery Science and Technology. The World Foundry Congress to be held in China will play the active role in facilitating the Chinese foundrymen to further understand and master the advanced foundry technologies in the world and promoting the digitalization, informatization and greening development of China?蒺s foundry technology.展开更多
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform...Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.展开更多
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ...There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.展开更多
At the invitation of the Chinese Association for International Understanding(CAFIU),a delegation of young members of Japan’s Diet headed by Taira Masaaki,member of House of Representatives visited Beijing from Decemb...At the invitation of the Chinese Association for International Understanding(CAFIU),a delegation of young members of Japan’s Diet headed by Taira Masaaki,member of House of Representatives visited Beijing from December 5 to 9.Chinese Vice-President Li Yuanchao met the delegation on December 7."We hope展开更多
On December 12th 2012, I had the honor to join a CAFIU five-member delegation to visit Poland, Serbia and Sweden headed by Mr. Liu Kaiyang, Deputy Secretary-General of CAFIU. During the visit, the delegation not only ...On December 12th 2012, I had the honor to join a CAFIU five-member delegation to visit Poland, Serbia and Sweden headed by Mr. Liu Kaiyang, Deputy Secretary-General of CAFIU. During the visit, the delegation not only took part in the arrangement of the International Conference "China-Europe: Role of NGOs" sponsored by CAFIU, China Foundation for Peace and Development, and Civil Association "the House of Poland" in Poland, but also had展开更多
At the invitation of Junior Chamber International Japan(JCI)and Kasikorn Research Center,Secretary General Nijian headed a 6-member CAFIU delegation to visit Japan and Thailand between Apr.12 and Apr.19,2016.I was pri...At the invitation of Junior Chamber International Japan(JCI)and Kasikorn Research Center,Secretary General Nijian headed a 6-member CAFIU delegation to visit Japan and Thailand between Apr.12 and Apr.19,2016.I was privileged to be a member of the delegation.This visit,which enabled me to have a close look into local landscape and customs of the two countries,gave me an insight into people-to-people interaction and cooperation.展开更多
At the invitation of the 48 Group Club of Britain,the Institute of International&European Affairs(IIEA)of Ireland and the Ministry of Foreign Affairs of Iceland,a six-member delegation led by Mr.Ai Ping,Member of ...At the invitation of the 48 Group Club of Britain,the Institute of International&European Affairs(IIEA)of Ireland and the Ministry of Foreign Affairs of Iceland,a six-member delegation led by Mr.Ai Ping,Member of the National Committee of CPPCC and CAFIU VicePresident visited Britain,Ireland展开更多
At the invitation of CAFIU,a 5-member ROK NGO delegation composed of representatives from two well-known think tanks,Asan Institute for Policy Studies and Chinese Studies Institute of Korea JoongAng Daily,visited Chin...At the invitation of CAFIU,a 5-member ROK NGO delegation composed of representatives from two well-known think tanks,Asan Institute for Policy Studies and Chinese Studies Institute of Korea JoongAng Daily,visited China from March 7 to 11.In Beijing,CAFIU Vice-President Ai Ping met with the delegation.CAFIU展开更多
文摘On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.
文摘On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.
文摘At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.
文摘In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.
文摘At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
文摘On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.
基金Project (No. 602032) supported by the Natural Science Foundationof Zhejiang Province, China
文摘New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
文摘 The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 days included technical presentations,social events and the very important Ph.D conference. During the event there were the General Assembly bringing together the organizations members from around the world,and an exhibition,supported by 34 world's leading foundry based companies. In addition the event coincided with the Czech Foundrymens Society Foundry Days now in its 46th year.……
基金supported by the National Science Council under Grant No. NSC100-2410-H-005-046
文摘Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
基金Supported by the National Basic Research Program of China(No.2012CB315905)the National Natural Science Foundation of China(No.61272501)the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China(No.J2013-31,Q2014-48)
文摘To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.
文摘Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, President of China Academy of Machinery Science and Technology, more recently attended the 67th World Foundry Congress, and visited the Royal Institute of Technology, Sweden; LOCOMO Cast Steel Company, Metso Corporation, Finland; Imperial College, London, United Kingdom; and Brunel University, United Kingdom. During the period of the Congress and in the course of visiting, the delegation had deeply technical exchanges with the organizations mentioned above in the fields of such technologies as numerical simulation and design of foundry technical processes, special materials and advanced casting technology for hydraulic turbines and steam turbines, dual-phase steels casting, nuclear shielding materials manufacturing, rheology and semi-solid casting technology, design and development of medium-frequency induction heating furnaces and so on. Both of them are on the chance of cooperation. The visiting of the delegation is quite successful. The 69th World Foundry Congress has been determined by World Foundry Organization to be held in China and it will be organized by Foundry Institution of Chinese Mechanical Engineering Society and China Academy of Machinery Science and Technology. The World Foundry Congress to be held in China will play the active role in facilitating the Chinese foundrymen to further understand and master the advanced foundry technologies in the world and promoting the digitalization, informatization and greening development of China?蒺s foundry technology.
文摘Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.
文摘There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
文摘At the invitation of the Chinese Association for International Understanding(CAFIU),a delegation of young members of Japan’s Diet headed by Taira Masaaki,member of House of Representatives visited Beijing from December 5 to 9.Chinese Vice-President Li Yuanchao met the delegation on December 7."We hope
文摘On December 12th 2012, I had the honor to join a CAFIU five-member delegation to visit Poland, Serbia and Sweden headed by Mr. Liu Kaiyang, Deputy Secretary-General of CAFIU. During the visit, the delegation not only took part in the arrangement of the International Conference "China-Europe: Role of NGOs" sponsored by CAFIU, China Foundation for Peace and Development, and Civil Association "the House of Poland" in Poland, but also had
文摘At the invitation of Junior Chamber International Japan(JCI)and Kasikorn Research Center,Secretary General Nijian headed a 6-member CAFIU delegation to visit Japan and Thailand between Apr.12 and Apr.19,2016.I was privileged to be a member of the delegation.This visit,which enabled me to have a close look into local landscape and customs of the two countries,gave me an insight into people-to-people interaction and cooperation.
文摘At the invitation of the 48 Group Club of Britain,the Institute of International&European Affairs(IIEA)of Ireland and the Ministry of Foreign Affairs of Iceland,a six-member delegation led by Mr.Ai Ping,Member of the National Committee of CPPCC and CAFIU VicePresident visited Britain,Ireland
文摘At the invitation of CAFIU,a 5-member ROK NGO delegation composed of representatives from two well-known think tanks,Asan Institute for Policy Studies and Chinese Studies Institute of Korea JoongAng Daily,visited China from March 7 to 11.In Beijing,CAFIU Vice-President Ai Ping met with the delegation.CAFIU