期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
“私自”和“暗自”的语义演变
1
作者 曹开建 《襄阳职业技术学院学报》 2018年第4期125-127,共3页
文章讨论了"私自"和"暗自"词汇化的演化过程,揭示了词缀"自"在"私自"、"暗自"成词过程中的作用,语境吸收对"私自"语义演变的影响,以及"暗自"对"私自"... 文章讨论了"私自"和"暗自"词汇化的演化过程,揭示了词缀"自"在"私自"、"暗自"成词过程中的作用,语境吸收对"私自"语义演变的影响,以及"暗自"对"私自"的语义替换过程。 展开更多
关键词 “私自” “暗自” 词汇化 语境吸收
下载PDF
私自开拆、隐匿、毁弃邮件、电报罪探疑
2
作者 姚兵 张志佳 《河南公安高等专科学校学报》 2006年第5期57-59,共3页
私自开拆、隐匿、毁弃邮件、电报罪的主体包括国家工作人员和非国家工作人员。“利用职务上的便利”不是本罪必要的构成要件要素。《刑法》第二百五十三条第二款的规定包括牵连犯和包容犯两种不同情形。
关键词 国家工作人员 牵连犯 包容犯 刑法 “私自开拆、隐匿、毁弃邮件、电报罪”
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
3
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
Value Disclosure of Young Adults Through Social Media in the Iraqi Kurdistan Region as an Emerging Democracy
4
作者 Goran Sabah Ghafour 《Journalism and Mass Communication》 2014年第5期303-317,共15页
This study examines how accurate young adults in the Iraqi Kurdistan Region, as an emerging democracy in the Middle East, express their core values through social media (Facebook in this context). It also explores w... This study examines how accurate young adults in the Iraqi Kurdistan Region, as an emerging democracy in the Middle East, express their core values through social media (Facebook in this context). It also explores whether privacy affects with value disclosure. Findings show that value disclosure and definition of privacy varied greatly among respondents and from one value to another. Based on in-depth interview with 12 young adults, the study finds that religious, social, and cultural values have been easily and freely expressed on Facebook accounts by the majority of young adults, whereas other values such as honesty, freedom of speech, and political beliefs are being held by others mainly for privacy issues and political reasons. Democracy was a core value for some young adults seeking to make sense of the western principles of democracy and that reflect on their Facebook account. Results suggest that male respondents practice more freedom and less caution about their privacy than the female respondents on Facebook. 展开更多
关键词 social media DEMOCRACY Iraq PRIVACY FACEBOOK
下载PDF
Problems of private industrial economic development and its countermeasures for Zigong City,Sichuan Province,China
5
作者 Peng Likun Chen Yijun 《Ecological Economy》 2007年第4期456-463,共8页
The differences of regional economic development between underdeveloped areas and developed areas are mainly embodied by different levels of private economic development. Since 20-year reform and opening-up to the out... The differences of regional economic development between underdeveloped areas and developed areas are mainly embodied by different levels of private economic development. Since 20-year reform and opening-up to the outside world, the private industry of Zigong has developed gradually, become more and more economically competitive, and played a more and more important role in the economic structure of Zigong. This paper analyzes the problems of private economy and its countermeasures based on the research on its status quo. 展开更多
关键词 West China Small and medium-sized cities Zigong City Private economry Countermeasures for development
下载PDF
A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET 被引量:2
6
作者 ZHU Xiaoling HU Donghui HOU Zhengfeng DING Liang 《China Communications》 SCIE CSCD 2014年第9期60-67,共8页
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a... Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET. 展开更多
关键词 vehicular ad hoc network locationbased services location k-anonymity securemulti-party computation
下载PDF
The Philosophy of Social Segregation in Israel's Democratic Schools
7
作者 Arie Kizel 《Journal of Philosophy Study》 2013年第11期1042-1050,共9页
Democratic private schools in Israel are a part of the neo-liberal discourse. They champion the dialogic philosophy associated with its most prominent advocates--Martin Buber, Emmanuel Levinas---together with Paulo Fr... Democratic private schools in Israel are a part of the neo-liberal discourse. They champion the dialogic philosophy associated with its most prominent advocates--Martin Buber, Emmanuel Levinas---together with Paulo Freire's critical pedagogy, the humanistic psychology propounded by Carl Rogers, Nel Noddings's pedagogy of care and concern, and even Gadamer's integrative hermeneutic perspective. Democratic schools form one of the greatest challenges to State education and most vocal and active critique of the focus conservative education places on exams and achievement. This article describes the dual discourse connected to the schools. The first is the inner dialogical, which is devoted to student freedom and progress, the child being placed at the center. The second is the exterior discourse, which represents the school as a place of counter-education that provides personal and group development and comprises a site of liberty and choice. The schools in Israel are described as test case and indicating the existence of a sophisticated form of deception via the use of alluring terminology. The democratic private schools should be recognized for what they really are--agents of commodification that undermine democracy rather than enhance it. 展开更多
关键词 philosophy of educational segregation emancipatory pedagogical project democratic schools
下载PDF
私自开拆、隐匿、毁弃邮件、电报罪若干问题探讨 被引量:2
8
作者 吴占英 《法学杂志》 2003年第6期52-54,共3页
根据立法精神,私自开拆、隐匿、毁弃邮件、电报罪必须是以利用职务之便为条件。对于刑法第253条第2款规定,应把握的是法条强调“犯前款罪而窃取财务的”情形。
关键词 “私自开拆、隐匿、毁弃邮件、电报罪” 犯罪构成 犯罪客体 民主权利 犯罪行为 人身权利 罪过形式
原文传递
Norms of legality in relation to the validity of juristic acts (rechtsgesch(?)ft):the influence of public law on the effect of juristic acts and its limitations
9
作者 谢鸿飞 《Social Sciences in China》 2008年第1期99-112,共14页
It is a common principle in all countries that juristic acts that violate jus cogens are invalid. This may be termed "norms of legality" in relation to the effect of juristic acts (Rechtsgeschaft). This refers onl... It is a common principle in all countries that juristic acts that violate jus cogens are invalid. This may be termed "norms of legality" in relation to the effect of juristic acts (Rechtsgeschaft). This refers only to jus cogens in public law, since jus cogens in private law is self-governing or autonomous in nature and its violation results at worst in ineffectiveness rather than invalidity. In determining whether legal acts that contravene public law are valid, the objectives of the related public laws must be examined and the principle of proportionality applied to limit the interpretation of the objectives of the public law in question, in order to further distinguish obligations in public law from those in private law. Local laws and administrative rules cannot be excluded completely in the application of civil law. Violation of the law and violation of public order and good custom have totally different effects and cannot be treated as the same thing. 展开更多
关键词 norms oflegality jus cogens norms of autonomy obligations in public law obligationsin private law
原文传递
ECONOMY
10
《Beijing Review》 2016年第22期6-7,共2页
Boosting Private Investment The National Development and Reform Commission(NDRC)announced its next round of local-level inspections on May 20,putting the implementation of policies related to private investment unde... Boosting Private Investment The National Development and Reform Commission(NDRC)announced its next round of local-level inspections on May 20,putting the implementation of policies related to private investment under scrutiny.Six teams will be sent to 12provincial-level regions,the NDRC said on its website.In the previous round,nine teams were dispatched by the State Council to 18 provinces and autonomous regions." 展开更多
关键词 private Boosting provincial autonomous putting factory ECONOMY Qingdao subsidiary Shandong
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部