期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
1
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party 被引量:1
2
作者 昌燕 许春香 +5 位作者 张仕斌 王海春 闫丽丽 韩贵华 黄源源 盛志伟 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期1-5,共5页
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third... In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack. 展开更多
关键词 of in it or IS on Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest third party TP with
下载PDF
A Positive Analysis for BPR of the Third Party Logistics
3
作者 LI Yan-feng 1, WU Xiao-song 2 (1. Management School, Huazhong University of Science and Technology, Wuhan 430074, China 2. Information Management School, Yunnan University of Finance and Trade, Kunming 650221, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期231-232,共2页
Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require m... Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers. 展开更多
关键词 third party logistics management technique info rmation technique business model
下载PDF
Customized Share Level Monitoring System for Users in OSN-Third Party Applications
4
作者 T.Shanmuigapriya S.Swamynathan Thiruvaazhi Uloli 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1327-1339,共13页
Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networ... Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user. 展开更多
关键词 Online social networks third party applications PRIVACY gaussian mixture model fuzzy inference
下载PDF
Research on the Third Party Performance Evaluation in Constructing Modern Public Sports Services
5
作者 Jianqiang Guo Hongcun Liu 《Journal of Sports Science》 2017年第4期227-230,共4页
This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and ca... This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports. 展开更多
关键词 MODERNIZATION public sports service the third party performance evaluation.
下载PDF
Study on the Factors Driving the Loyalty of the Customers of a Third Party Mobile Payment Platform
6
作者 Zhengjie ZHANG Xue DONG +1 位作者 Fang ZOU Zhiguang GUO 《International Journal of Technology Management》 2015年第11期16-19,共4页
. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome... . In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented. 展开更多
关键词 A third party Mobile Payment Customer Loyalty Perceived Value Trust in Relationship
下载PDF
An Exploration of the Influences of a Third Party on Chinese College Students’Speech Act of Disagreement
7
作者 刘颖 《海外英语》 2021年第12期105-107,共3页
Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to ... Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings. 展开更多
关键词 disagreement strategies a third party speech act theory Chinese settings
下载PDF
Research on Resources Integration of the Fourth Party Logistics based on Multiple Agent
8
作者 Liping YANG 《International Journal of Technology Management》 2015年第2期97-100,共4页
The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resourc... The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resources integration, understand the characteristics of complexi .ty, the virtual and dynamic and so on, the paper analyzed the three kinds of Agent attribute for fourth party logistics resources integration system using the Agent technology and the principle, and then puts forward the fourth party logistics resources integration model of based on multi Agent. 展开更多
关键词 Fourth party logistics third party logistics MULTI-AGENT Resource integration
下载PDF
“Fundamental Rights and Private Law” in China
9
作者 奚若晨 张翔 LIU Zhao 《The Journal of Human Rights》 2023年第1期109-133,共25页
The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitut... The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory. 展开更多
关键词 the effect against a third party the case of Qi Yuling the judicial enforcement of the Constitution Civil Code constitutionalization of private law
下载PDF
Integrated logistics facilities network design for 3PLS under uncertainty 被引量:1
10
作者 张永 李建 +1 位作者 李旭宏 毛海军 《Journal of Southeast University(English Edition)》 EI CAS 2006年第4期570-576,共7页
According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are ... According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are designed. First, a fuzzy model is proposed by taking multiple customers, multiple commodities, capacitated facility location and integrated logistics facility layout into account. In the model, the fuzzy customer demands and transportation rates are illustrated by triangular fuzzy numbers. Secondly, the fuzzy model is converted into a crisp model by applying fuzzy chance constrained theory and possibility theory, and one hybrid genetic algorithm is designed for the crisp model. Finally, two different examples are designed to illustrate that the model and solution discussed are valid. 展开更多
关键词 third party logistics supplier integrated logistics facilities network design fuzzy chance constrained model hybrid genetic algorithm UNCERTAINTY
下载PDF
第三方电子商务的个性化信息推荐系统 被引量:3
11
作者 郑华 彭欣 《计算机工程与设计》 CSCD 北大核心 2009年第12期2981-2984,共4页
在分析已有成果的基础上,设计了一个面向第三方电子商务的个性化信息推荐系统,并详细阐述了该系统的体系结构、功能划分以及关键技术。该系统通过追踪用户的阅读行为、分析用户的喜好,进而学习用户的兴趣和行为,实现了主动向用户推荐个... 在分析已有成果的基础上,设计了一个面向第三方电子商务的个性化信息推荐系统,并详细阐述了该系统的体系结构、功能划分以及关键技术。该系统通过追踪用户的阅读行为、分析用户的喜好,进而学习用户的兴趣和行为,实现了主动向用户推荐个性化信息、个性化评比、个性化主题分类及版面配置的功能。实验结果表明,该个性化信息推荐系统具有较好的性能。 展开更多
关键词 个性化 第三方电子商务 推荐 客户端/服务器 JAVA
下载PDF
Comparable anti-CMV responses of transplant donor and third-party CMV-specific T cells for treatment of CMV infection after allogeneic stem cell transplantation 被引量:4
12
作者 Xu-Ying Pei Xue-Fei Liu +11 位作者 Xiang-Yu Zhao Meng Lv Xiao-Dong Mo Ying-Jun Chang Qian-Nan Shang Yu-Qian Sun Yu-Hong Chen Lan-Ping Xu Yu Wang Xiao-Hui Zhang Kai-Yan Liu Xiao-Jun Huang 《Cellular & Molecular Immunology》 SCIE CAS CSCD 2022年第4期482-491,共10页
Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell tran... Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity. 展开更多
关键词 Allogeneic stem cell transplantation CMV-specific cytotoxic T lymphocytes Transplant donor third party donor IMMUNOTHERAPY
原文传递
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:3
13
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm ENCRYPTION efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups 被引量:3
14
作者 Yue Zhang Hanlin Zhang +1 位作者 Rong Hao Jia Yu 《China Communications》 SCIE CSCD 2018年第11期111-121,共11页
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica... Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient. 展开更多
关键词 cloud storage cloud storage auditing large-scale users third party auditor
下载PDF
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States 被引量:1
15
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 Quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
下载PDF
The Role of Third-Party Participation in Urban Planning: A Case Study on the Enning Road Neighborhood Renovation Project in Guangzhou 被引量:1
16
作者 Zuquan WU De WANG +1 位作者 Chasong ZHU Qingfei ZHANG 《China City Planning Review》 2014年第3期48-57,共10页
Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in Chin... Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public. 展开更多
关键词 third party urban planning public participation Enning Road Neighborhood
原文传递
Geo-Spatial Analysis of Oil Spill Distribution and Susceptibility in the Niger Delta Region of Nigeria 被引量:1
17
作者 Shittu Whanda Olalekan Adekola +2 位作者 Bashir Adamu Sani Yahaya Prem C. Pandey 《Journal of Geographic Information System》 2016年第4期438-456,共20页
Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producin... Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies. 展开更多
关键词 Oil Spills GIS Analysis third party Damage Interdiction Pollutant Linkages
下载PDF
Quantum Electronic Contract Scheme Based on Single Photon
18
作者 Tian Cao Yan Chang +2 位作者 Lili Yan Shibin Zhang Qirun Wang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1507-1517,共11页
An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electron... An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy. 展开更多
关键词 E-contract quantum cryptography single photon trusted third party
下载PDF
Brexit Implications on Capital Market and International Financial Governance
19
作者 Mavie Cardi 《Journal of Modern Accounting and Auditing》 2017年第9期385-393,共9页
This paper assumes as a focal point the concept that the "post-Brexit" may represent a change of era for European and global financial service and particularly for capital market sector. The change of era produces n... This paper assumes as a focal point the concept that the "post-Brexit" may represent a change of era for European and global financial service and particularly for capital market sector. The change of era produces new "global systemic interrelation" in which financial globalization, governance and regulation will give place to new, largely unknown complexities. In general, the different interests and immediate priorities of euro and non-euro countries, coupled with a need for prompt and, at times, politically sensitive action, have had the result of a greater fragmentation or a differentiated integration in EU governance in the financial sector. On this assumption, we may say that the post-Brexit scenario is in some way preceded by a series of "fractures" in European governance. The direct effect of the post-Brexit era is that UK regulated financial entities will still need "passporting" across the EU single market: UK is going to vest the role of third party country, which will require an "equivalence regime" similar to the "substituted compliance" used in the same direction by US regulators. At the same time, while an equivalence regime may work in principle to deal cross-border issues at the global level, in the long term, it may be an instrument for a "battle of ideas" in the new political arena of global financial governance. 展开更多
关键词 post-Brexit EU financial governance financial services third party country capital market
下载PDF
Understanding Trust Transfer in Construction Project Marketplace of China
20
作者 Chen Menglong Yin Yinlin 《Journal of Civil Engineering and Architecture》 2022年第11期541-556,共16页
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the... Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project. 展开更多
关键词 Trust transfer trustor the third party TRUSTEE construction project
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部