Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app...Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption.展开更多
This study examines how accurate young adults in the Iraqi Kurdistan Region, as an emerging democracy in the Middle East, express their core values through social media (Facebook in this context). It also explores w...This study examines how accurate young adults in the Iraqi Kurdistan Region, as an emerging democracy in the Middle East, express their core values through social media (Facebook in this context). It also explores whether privacy affects with value disclosure. Findings show that value disclosure and definition of privacy varied greatly among respondents and from one value to another. Based on in-depth interview with 12 young adults, the study finds that religious, social, and cultural values have been easily and freely expressed on Facebook accounts by the majority of young adults, whereas other values such as honesty, freedom of speech, and political beliefs are being held by others mainly for privacy issues and political reasons. Democracy was a core value for some young adults seeking to make sense of the western principles of democracy and that reflect on their Facebook account. Results suggest that male respondents practice more freedom and less caution about their privacy than the female respondents on Facebook.展开更多
The differences of regional economic development between underdeveloped areas and developed areas are mainly embodied by different levels of private economic development. Since 20-year reform and opening-up to the out...The differences of regional economic development between underdeveloped areas and developed areas are mainly embodied by different levels of private economic development. Since 20-year reform and opening-up to the outside world, the private industry of Zigong has developed gradually, become more and more economically competitive, and played a more and more important role in the economic structure of Zigong. This paper analyzes the problems of private economy and its countermeasures based on the research on its status quo.展开更多
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a...Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.展开更多
Democratic private schools in Israel are a part of the neo-liberal discourse. They champion the dialogic philosophy associated with its most prominent advocates--Martin Buber, Emmanuel Levinas---together with Paulo Fr...Democratic private schools in Israel are a part of the neo-liberal discourse. They champion the dialogic philosophy associated with its most prominent advocates--Martin Buber, Emmanuel Levinas---together with Paulo Freire's critical pedagogy, the humanistic psychology propounded by Carl Rogers, Nel Noddings's pedagogy of care and concern, and even Gadamer's integrative hermeneutic perspective. Democratic schools form one of the greatest challenges to State education and most vocal and active critique of the focus conservative education places on exams and achievement. This article describes the dual discourse connected to the schools. The first is the inner dialogical, which is devoted to student freedom and progress, the child being placed at the center. The second is the exterior discourse, which represents the school as a place of counter-education that provides personal and group development and comprises a site of liberty and choice. The schools in Israel are described as test case and indicating the existence of a sophisticated form of deception via the use of alluring terminology. The democratic private schools should be recognized for what they really are--agents of commodification that undermine democracy rather than enhance it.展开更多
It is a common principle in all countries that juristic acts that violate jus cogens are invalid. This may be termed "norms of legality" in relation to the effect of juristic acts (Rechtsgeschaft). This refers onl...It is a common principle in all countries that juristic acts that violate jus cogens are invalid. This may be termed "norms of legality" in relation to the effect of juristic acts (Rechtsgeschaft). This refers only to jus cogens in public law, since jus cogens in private law is self-governing or autonomous in nature and its violation results at worst in ineffectiveness rather than invalidity. In determining whether legal acts that contravene public law are valid, the objectives of the related public laws must be examined and the principle of proportionality applied to limit the interpretation of the objectives of the public law in question, in order to further distinguish obligations in public law from those in private law. Local laws and administrative rules cannot be excluded completely in the application of civil law. Violation of the law and violation of public order and good custom have totally different effects and cannot be treated as the same thing.展开更多
Boosting Private Investment The National Development and Reform Commission(NDRC)announced its next round of local-level inspections on May 20,putting the implementation of policies related to private investment unde...Boosting Private Investment The National Development and Reform Commission(NDRC)announced its next round of local-level inspections on May 20,putting the implementation of policies related to private investment under scrutiny.Six teams will be sent to 12provincial-level regions,the NDRC said on its website.In the previous round,nine teams were dispatched by the State Council to 18 provinces and autonomous regions."展开更多
文摘Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption.
文摘This study examines how accurate young adults in the Iraqi Kurdistan Region, as an emerging democracy in the Middle East, express their core values through social media (Facebook in this context). It also explores whether privacy affects with value disclosure. Findings show that value disclosure and definition of privacy varied greatly among respondents and from one value to another. Based on in-depth interview with 12 young adults, the study finds that religious, social, and cultural values have been easily and freely expressed on Facebook accounts by the majority of young adults, whereas other values such as honesty, freedom of speech, and political beliefs are being held by others mainly for privacy issues and political reasons. Democracy was a core value for some young adults seeking to make sense of the western principles of democracy and that reflect on their Facebook account. Results suggest that male respondents practice more freedom and less caution about their privacy than the female respondents on Facebook.
文摘The differences of regional economic development between underdeveloped areas and developed areas are mainly embodied by different levels of private economic development. Since 20-year reform and opening-up to the outside world, the private industry of Zigong has developed gradually, become more and more economically competitive, and played a more and more important role in the economic structure of Zigong. This paper analyzes the problems of private economy and its countermeasures based on the research on its status quo.
基金the National Natural Science Foundation of China,by the Natural Science Foundation of Anhui Province,by the Specialized Research Fund for the Doctoral Program of Higher Education of China,the Fundamental Research Funds for the Central Universities
文摘Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.
文摘Democratic private schools in Israel are a part of the neo-liberal discourse. They champion the dialogic philosophy associated with its most prominent advocates--Martin Buber, Emmanuel Levinas---together with Paulo Freire's critical pedagogy, the humanistic psychology propounded by Carl Rogers, Nel Noddings's pedagogy of care and concern, and even Gadamer's integrative hermeneutic perspective. Democratic schools form one of the greatest challenges to State education and most vocal and active critique of the focus conservative education places on exams and achievement. This article describes the dual discourse connected to the schools. The first is the inner dialogical, which is devoted to student freedom and progress, the child being placed at the center. The second is the exterior discourse, which represents the school as a place of counter-education that provides personal and group development and comprises a site of liberty and choice. The schools in Israel are described as test case and indicating the existence of a sophisticated form of deception via the use of alluring terminology. The democratic private schools should be recognized for what they really are--agents of commodification that undermine democracy rather than enhance it.
文摘It is a common principle in all countries that juristic acts that violate jus cogens are invalid. This may be termed "norms of legality" in relation to the effect of juristic acts (Rechtsgeschaft). This refers only to jus cogens in public law, since jus cogens in private law is self-governing or autonomous in nature and its violation results at worst in ineffectiveness rather than invalidity. In determining whether legal acts that contravene public law are valid, the objectives of the related public laws must be examined and the principle of proportionality applied to limit the interpretation of the objectives of the public law in question, in order to further distinguish obligations in public law from those in private law. Local laws and administrative rules cannot be excluded completely in the application of civil law. Violation of the law and violation of public order and good custom have totally different effects and cannot be treated as the same thing.
文摘Boosting Private Investment The National Development and Reform Commission(NDRC)announced its next round of local-level inspections on May 20,putting the implementation of policies related to private investment under scrutiny.Six teams will be sent to 12provincial-level regions,the NDRC said on its website.In the previous round,nine teams were dispatched by the State Council to 18 provinces and autonomous regions."