Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third...In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.展开更多
Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require m...Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.展开更多
Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networ...Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.展开更多
This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and ca...This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.展开更多
. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome.... In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.展开更多
Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to ...Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.展开更多
The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resourc...The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resources integration, understand the characteristics of complexi .ty, the virtual and dynamic and so on, the paper analyzed the three kinds of Agent attribute for fourth party logistics resources integration system using the Agent technology and the principle, and then puts forward the fourth party logistics resources integration model of based on multi Agent.展开更多
The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitut...The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.展开更多
According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are ...According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are designed. First, a fuzzy model is proposed by taking multiple customers, multiple commodities, capacitated facility location and integrated logistics facility layout into account. In the model, the fuzzy customer demands and transportation rates are illustrated by triangular fuzzy numbers. Secondly, the fuzzy model is converted into a crisp model by applying fuzzy chance constrained theory and possibility theory, and one hybrid genetic algorithm is designed for the crisp model. Finally, two different examples are designed to illustrate that the model and solution discussed are valid.展开更多
Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell tran...Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.展开更多
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident...Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.展开更多
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica...Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in Chin...Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public.展开更多
Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producin...Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies.展开更多
An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electron...An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy.展开更多
This paper assumes as a focal point the concept that the "post-Brexit" may represent a change of era for European and global financial service and particularly for capital market sector. The change of era produces n...This paper assumes as a focal point the concept that the "post-Brexit" may represent a change of era for European and global financial service and particularly for capital market sector. The change of era produces new "global systemic interrelation" in which financial globalization, governance and regulation will give place to new, largely unknown complexities. In general, the different interests and immediate priorities of euro and non-euro countries, coupled with a need for prompt and, at times, politically sensitive action, have had the result of a greater fragmentation or a differentiated integration in EU governance in the financial sector. On this assumption, we may say that the post-Brexit scenario is in some way preceded by a series of "fractures" in European governance. The direct effect of the post-Brexit era is that UK regulated financial entities will still need "passporting" across the EU single market: UK is going to vest the role of third party country, which will require an "equivalence regime" similar to the "substituted compliance" used in the same direction by US regulators. At the same time, while an equivalence regime may work in principle to deal cross-border issues at the global level, in the long term, it may be an instrument for a "battle of ideas" in the new political arena of global financial governance.展开更多
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the...Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.展开更多
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61402058,61572086 and 61370203the Fund for Middle and Young Academic Leaders of Chengdu University of Information Technology under Grant No J201511+2 种基金the Science and Technology Support Project of Sichuan Province under Grant No 2013GZX0137the Fund for Young Persons Project of Sichuan Province under Grant No 12ZB017the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No szjj2014-074
文摘In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.
文摘Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.
文摘Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.
文摘This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.
文摘. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.
文摘Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.
文摘The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resources integration, understand the characteristics of complexi .ty, the virtual and dynamic and so on, the paper analyzed the three kinds of Agent attribute for fourth party logistics resources integration system using the Agent technology and the principle, and then puts forward the fourth party logistics resources integration model of based on multi Agent.
文摘The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.
文摘According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are designed. First, a fuzzy model is proposed by taking multiple customers, multiple commodities, capacitated facility location and integrated logistics facility layout into account. In the model, the fuzzy customer demands and transportation rates are illustrated by triangular fuzzy numbers. Secondly, the fuzzy model is converted into a crisp model by applying fuzzy chance constrained theory and possibility theory, and one hybrid genetic algorithm is designed for the crisp model. Finally, two different examples are designed to illustrate that the model and solution discussed are valid.
基金DB is supported by grants from the German Research Foundation(361210922/RTG 2408 and SFB 854/A23).
文摘Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.
文摘Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.
基金supported by National Natural Science Foundation of China (No. 61572267, No. 61272425, No. 61402245)the Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University+1 种基金the Open Project of the State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(No.2017-MS-21, No.2016-MS-23)National Cryptography Development Fund of China (MMJJ20170118)
文摘Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.
基金the Third Prize at the 7th Youth Paper Awards of Urban Planning Society of China, which was also named as the 13th National Youth Thesis Competition on Urban Planning, sponsored by the Urban Planning Society of China
文摘Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public.
文摘Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies.
基金This work is supported by NSFC(Grant Nos.61572086,61402058)Sichuan Science and Technology Program(Grant Nos.2017JY0168,2018TJPT0012,2018GZ0232,2018CC0060,2017GFW0119,2017GZ0006,2016GFW0127)+2 种基金the National Key Research and Development Program(No.2017YFB0802302)Sichuan innovation team of quantum security communication(No.17TD0009)Sichuan academic and technical leaders training funding support projects(No.2016120080102643).
文摘An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy.
文摘This paper assumes as a focal point the concept that the "post-Brexit" may represent a change of era for European and global financial service and particularly for capital market sector. The change of era produces new "global systemic interrelation" in which financial globalization, governance and regulation will give place to new, largely unknown complexities. In general, the different interests and immediate priorities of euro and non-euro countries, coupled with a need for prompt and, at times, politically sensitive action, have had the result of a greater fragmentation or a differentiated integration in EU governance in the financial sector. On this assumption, we may say that the post-Brexit scenario is in some way preceded by a series of "fractures" in European governance. The direct effect of the post-Brexit era is that UK regulated financial entities will still need "passporting" across the EU single market: UK is going to vest the role of third party country, which will require an "equivalence regime" similar to the "substituted compliance" used in the same direction by US regulators. At the same time, while an equivalence regime may work in principle to deal cross-border issues at the global level, in the long term, it may be an instrument for a "battle of ideas" in the new political arena of global financial governance.
文摘Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.