The aim of this work is to contribute to plugging the lacuna in the public policy theory literature regarding the reflection of and sensitivity to the experiences and realities of developing countries. The policy expe...The aim of this work is to contribute to plugging the lacuna in the public policy theory literature regarding the reflection of and sensitivity to the experiences and realities of developing countries. The policy experience of China which shares similar development circumstances historically(a compelling fact) with developing countries and indeed still considers itself to be one will serve as the framework of discourse in making the case that broad and significant themes can be gleaned from China's development process( in the last three decades) of conceptual value in crafting a theory of the policy process relevant to a developing world. This will be done by a review of the literature on the theories of the policy process. The second part of this work will utilize the empirics of China's development policy formation experience in bringing forward what we regard as salient concepts. In the final part of this paper, hints will be provided for crafting a theory of the policy process of relevance to developing countries.展开更多
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p...Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.展开更多
文摘The aim of this work is to contribute to plugging the lacuna in the public policy theory literature regarding the reflection of and sensitivity to the experiences and realities of developing countries. The policy experience of China which shares similar development circumstances historically(a compelling fact) with developing countries and indeed still considers itself to be one will serve as the framework of discourse in making the case that broad and significant themes can be gleaned from China's development process( in the last three decades) of conceptual value in crafting a theory of the policy process relevant to a developing world. This will be done by a review of the literature on the theories of the policy process. The second part of this work will utilize the empirics of China's development policy formation experience in bringing forward what we regard as salient concepts. In the final part of this paper, hints will be provided for crafting a theory of the policy process of relevance to developing countries.
文摘Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.