期刊文献+
共找到2,973篇文章
< 1 2 149 >
每页显示 20 50 100
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
1
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
下载PDF
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization 被引量:1
2
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3801-3813,共13页
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen... Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme. 展开更多
关键词 CP-ABE geohash new time tree(NTT) multi authorization dynamic attribute
下载PDF
Study on Emergency Use Authorization and Risk Control of Pfizer-BioNTech Vaccine
3
作者 Wang Yiran Yang Yue 《Asian Journal of Social Pharmacy》 2023年第1期24-29,共6页
Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine ... Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time. 展开更多
关键词 COVID-19 vaccine emergency use authorization surveillance
下载PDF
A Quantum Authorization Management Protocol Based on EPRPairs
4
作者 Yan Chang Shibin Zhang +5 位作者 Lili Yan Guihua Han Haiquan Song Yan Zhang Xueyang Li Qirun Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期1005-1014,共10页
Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is ... Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols. 展开更多
关键词 Quantum authorization management entanglement swapping fin-grained rights division
下载PDF
Power authorization by adding digital controller to electrical equipment
5
作者 单庆晓 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期281-286,共6页
Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor.This paper pro-poses a digitalized power system based on synthetical transmission carrier which makes the power system al... Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor.This paper pro-poses a digitalized power system based on synthetical transmission carrier which makes the power system also serves as a data communication system with the same structure.Loads get authorized before powered on,so their behaviour is predictable.Digitalized power system includes such basic units as digital power source,hub and load.Their concepts are explained,their behaviour and implements are also described in detail.Real time distribution of residual power is applied,which makes prompt authorization possible.Communication protocol and load address assignments are also presented in this paper.A prototype is built and the results verify the effect of the new proposed power system. 展开更多
关键词 power distribution power transmission power authorization power system
下载PDF
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
6
作者 Zhikui CHEN Song YANG 《Communications and Network》 2009年第2期74-81,共8页
Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (... Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on a user privacy protected infrastructure is our focus. Based on a user-centric vir-tual identity defined by EU IST project Daidalos, this paper firstly proposes an effective infrastructure which protects the context-driven access policies for online services in order to avoid attacks by malicious eaves-droppers. In the proposed infrastructure, SMAL and Diameter are used to securely protect and deliver au-thenticated and authorized entities and XACML is used to authorize the user-level privacy policy. On the basis of it, a dynamic fast authentication and authorization handover mechanism is proposed which can save one trip communication time consummation between administrative domains. 展开更多
关键词 PRIVACY Policy Security VID AUTHENTICATION authorization
下载PDF
Embedding Authentication &Authorization in Discovery Protocols for Standard Based Publish/Subscribe Middleware: A Performance Evaluation
7
作者 Fabrizio Ronci Marco Listanti 《Communications and Network》 2011年第1期39-49,共11页
Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to ... Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well ex-ploited by Peer-To-Peer (P2P) systems, Internet-wide as long as private ones, like in Public Safety or Civil Protection Communication Systems;but Pub/Sub specifications, and DDS/RTPS (Real Time Publish Sub-scribe) as well, usually do not provide Authentication & Authorization (AA) mechanisms. In the present work two important novelties are assessed: a possible scheme to implement AA in DDS/RTPS networks and a time performance evaluation study about embedded Authentication in RTPS. 展开更多
关键词 MIDDLEWARE PUBLISH/SUBSCRIBE Data Distribution Service AUTHENTICATION authorization
下载PDF
Copyright Authorization Statement
8
《Meteorological and Environmental Research》 CAS 2012年第12期88-88,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclu-sively to the editorial department of Meteorological and Environmental Research the digital
关键词 Copyright authorization Statement
下载PDF
Research on Construction of Pharmacovigilance System for Marketing Authorization Holders in China
9
作者 Zhao Jiai Tian Lijuan 《Asian Journal of Social Pharmacy》 2024年第2期106-116,共11页
Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m... Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage. 展开更多
关键词 marketing authorization holder(MAH) pharmacovigilance system good pharmacovigilance practice
下载PDF
Blockchain-based cross-domain authorization system for user-centric resource sharing
10
作者 Yuki Ezawa Shohei Kakei +2 位作者 Yoshiaki Shiraishi Masami Mohri Masakatu Morii 《Blockchain(Research and Applications)》 EI 2023年第2期67-81,共15页
User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Neverth... User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor. 展开更多
关键词 Access control authorization Blockchain Hyperledger fabric User-managed access
原文传递
Access Control and Authorization in Smart Homes: A Survey 被引量:2
11
作者 Ziarmal Nazar Mohammad Fadi Farha +2 位作者 Adnan O.M Abuassba Shunkun Yang Fang Zhou 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第6期906-917,共12页
With the rapid development of cyberspace and smart home technology, human life is changing to a new virtual dimension with several promises for improving its quality. Moreover, the heterogeneous, dynamic, and internet... With the rapid development of cyberspace and smart home technology, human life is changing to a new virtual dimension with several promises for improving its quality. Moreover, the heterogeneous, dynamic, and internet-connected nature of smart homes brings many privacy and security difficulties. Unauthorized access to the smart home system is one of the most harmful actions and can cause several trust problems and relationship conflicts between family members and invoke home privacy issues. Access control is one of the best solutions for handling this threat, and it has been used to protect smart homes and other Internet of Things domains for many years. This survey reviews existing access control schemes for smart homes, which concern the essential authorization requirements and challenges that need to be considered while designing an authorization framework for smart homes. Furthermore, we note the most critical challenges that other access control solutions neglect for smart homes. 展开更多
关键词 access control smart home authorization frameworks
原文传递
Modeling mitochondria,where are the numbers?
12
作者 Adrian M.Davies Alan G.Holt 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1435-1436,共2页
Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authoriti... Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035. 展开更多
关键词 eliminate authorities ACCEPTANCE
下载PDF
Information for Authors
13
《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第3期I0001-I0001,共1页
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche... Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs. 展开更多
关键词 JOURNAL BREAKTHROUGH AUTHORS
下载PDF
Information for Authors
14
《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期F0003-F0003,共1页
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat... General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China. REPUBLIC AUTHORS
下载PDF
Predicting Age and Gender in Author Profiling: AMulti-Feature Exploration
15
作者 Aiman Muhammad Arshad +2 位作者 BilalKhan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Comprehensive effects of traditional Chinese medicine treatment on heart failure and changes in B-type natriuretic peptide levels: A meta-analysis
16
作者 Li-Li Xia Shu-Yun Yang +2 位作者 Jun-Yao Xu Han-Qing Chen Zhu-Yuan Fang 《World Journal of Clinical Cases》 SCIE 2024年第4期766-776,共11页
BACKGROUND Heart failure(HF),a common cardiovascular condition,is characterized by significant morbidity and mortality.While traditional Chinese medicine(TCM)is often used as a complementary approach in HF management,... BACKGROUND Heart failure(HF),a common cardiovascular condition,is characterized by significant morbidity and mortality.While traditional Chinese medicine(TCM)is often used as a complementary approach in HF management,systematic evalua-tions of its impact on clinical outcomes,TCM syndrome scores,and B-type natriuretic peptide(BNP)levels are lacking.This study fills this gap through a comprehensive analysis of randomized controlled trials(RCTs)focusing on TCM for HF treatment.It encompasses an assessment of methodological quality,a meta-analysis,and an evaluation of evidence quality based on established standards.The results offer crucial insights into the potential advantages and constraints of TCM in HF management.RCTs on TCM for HF treatment published since the establishment of the database were searched in four Chinese and English databases,including China National Knowledge Infrastructure,Wanfang,VIP Information Chinese Science and Technology Journal,and PubMed.Methodological quality was assessed for the included studies with the Cochrane risk-of-bias assessment tool,and the meta-analysis and publication bias assessment was performed with the RevMan5.3 software.Finally,the quality of evidence was rated according to the GRADE criteria.RESULTS A total of 1098 RCTs were initially retrieved.After screening,16 RCTs were finally included in our study,which were published between 2020 and 2023.These RCTs involved 1660 HF patients,including 832 in the TCM group[TCM combined with conventional Western medicine(CMW)treatment]and 828 in the CWM group(CWM treatment).The course of treatments varied from 1 wk to 3 months.TCM syndrome differentiation was analyzed in 11 of the included RCTs.In all included RCTs,outcome indicators included comprehensive clinical outcomes,TCM syndrome scores,and BNP levels.The meta-analysis results showed significant differences between the TCM and CWM groups in terms of comprehensive clinical outcomes[risk ratio=-0.54;95%confidence interval(CI)=-0.61,-0.47;P<0.00001],TCM syndrome scores[weighted mean difference(WMD)=-142.07;95%CI=-147.56,-136.57;P<0.00001],and BNP levels(WMD=-142.07;95%CI=-147.56,-136.57;P<0.00001).According to the GRADE criteria,RCTs where"TCM improves clinical comprehensive outcomes"were rated as low-quality evidence,and RCTs where"TCM reduces TCM syndrome scores"or"TCM decreases BNP levels"were rated as medium-quality evidence.CONCLUSION TCM combined with CWM treatment effectively improves comprehensive clinical outcomes and diminishes TCM syndrome scores and BNP levels in HF patients.Given the low and medium quality of the included RCTs,the application of these results should be cautious. 展开更多
关键词 Traditional Chinese medicine Heart failure Comprehensive clinical outcomes Traditional Chinese medicine syndrome score B-type natriuretic peptide level Meta-analysis©The Author(s)2024.Published by Baishideng Publishing Group Inc.
下载PDF
POLICIES
17
《China's Foreign Trade》 2024年第2期4-5,共2页
China's Trade with other BRICS Members up 11.3%in Q1China's trade with other BRICS members hit RMB 1.49 trillion (USD209.7 billion) in the first quarter,up 11.3%year-on-year,according to customs authorities.Th... China's Trade with other BRICS Members up 11.3%in Q1China's trade with other BRICS members hit RMB 1.49 trillion (USD209.7 billion) in the first quarter,up 11.3%year-on-year,according to customs authorities.The trade value accounted for 14.7%of the nation's total foreign trade value during the same period,said the General Administration of Customs(GAC). 展开更多
关键词 TRADE authorities CUSTOMS
下载PDF
Information for Authors
18
《Journal of Polyphenols》 2024年第1期42-43,共2页
General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover ... General Rules Journal of Polyphenols publishes research articles,reviews and short communications in English,on the fields of the science and technology of plant polyphenols.Cover Letters The journal requires a cover letter be included in submissions.A cover letter should explain why this topic is important,why these results are significant and what the novelty of this work is. 展开更多
关键词 AUTHORS LETTER SHE
下载PDF
News Roundup
19
《ChinAfrica》 2024年第2期8-10,共3页
The passenger flow in Moroccan airports reached a record high of over 27 million trips in 2023,increasing by 32 percent year on year,the Moroccan Airports Authority(ONDA)said on 15 January.
关键词 AUTHORITY TRIPS RECORD
下载PDF
Paper Analysis of Shanghai Ocean University in Bibliometric Method from Web of Science
20
作者 Jia Jiang 《Journal of Applied Mathematics and Physics》 2024年第2期632-638,共7页
The data of this research was mainly collected from the Web of Science (WOS) and Incites database platform, which was filtered and cataloged according to the different platforms. For tracing the change in scientific r... The data of this research was mainly collected from the Web of Science (WOS) and Incites database platform, which was filtered and cataloged according to the different platforms. For tracing the change in scientific research at Shanghai Ocean University, make use of Bibliometric analysis to get the image and table of highly cited papers and hot papers. In this study, the scientific aspects in highly cited papers and hot papers, published in the last year in the core collection of Web of Science, were taken as objects, and office software was used as the main tool to carry out bibliometric and figure analysis. From the four aspects to find the difference in these fields, the production of specific fields and cited times is inconsistent. And suggest the department and management adjust the policy and method via elastic personnel and rewards to prompt the advancement of the research fields. 展开更多
关键词 Highly Cited Papers Hot Paper Shanghai Ocean University COMPARISON Cited Times AUTHOR
下载PDF
上一页 1 2 149 下一页 到第
使用帮助 返回顶部