To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human interven...To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.展开更多
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed...In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.展开更多
In this paper, two sets of gravity and magnetic data were used to study the tectonics of the southern East China Sea and Ryukyu trench-arc system: one data set was from the 'Geological-geophysical map series of Chin...In this paper, two sets of gravity and magnetic data were used to study the tectonics of the southern East China Sea and Ryukyu trench-arc system: one data set was from the 'Geological-geophysical map series of China Seas and adjacent areas' database and the other was newly collected by R/VKexue Ⅲ in 2011. Magnetic and gravity data were reorganized and processed using the software MMDP, MGDP and RGIS. In addition to the description of the anomaly patterns in different areas, deep and shallow structure studies were performed by using several kinds of calculation, including a spectrum analysis, upward-continuation of the Bouguer anomaly and horizontal derivatives of the total-field magnetic anomaly. The depth of the Moho and magnetic basement were calculated. Based on the above work, several controversial tectonic problems were discussed. Compared to the shelf area and Ryukyu Arc, the Okinawa Trough has an obviously thinned crust, with the thinnest area having thickness less than 14km in the southern part. The Taiwan-Sinzi belt, which terminates to the south by the NW-SE trending Miyako fault belt, contains the relic volcanic arc formed by the splitting of the paleo Ryukyu volcanic arc as a result of the opening of the Okinawa Trough. As an important tectonic boundary, the strike-slip type Miyako fault belt extends northwestward into the shelf area and consists of several discontinuous segments. A forearc terrace composed of an exotic terrane collided with the Ryukyu Arc following the subduction of the Philippine Sea Plate. Mesozoic strata of varying thicknesses exist beneath the Cenozoic strata in the shelf basin and significantly influence the magnetic pattern of this area. The gravity and magnetic data support the existence of a Great East China Sea, which suggests that the entire southern East China Sea shelf area was a basin in the Mesozoic without alternatively arranged uplifts and depressions, and might have extended southwestward and connected with the northern South China Sea shelf basin.展开更多
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi...Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.展开更多
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient...Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.展开更多
A promising bacterial strain for the biodegradation of Microcystins(MCs)was isolated from Dianchi lake in China and identified as Sphingopyxis sp.USTB-05 by the analysis of 16s rDNA.Initial MC-RR of 42.3 mg·L -1 ...A promising bacterial strain for the biodegradation of Microcystins(MCs)was isolated from Dianchi lake in China and identified as Sphingopyxis sp.USTB-05 by the analysis of 16s rDNA.Initial MC-RR of 42.3 mg·L -1 was completely degraded by USTB-05 within 36 h,which was a relatively high biodegradation rate of MC-RR.With the cell-free extract(CE)of Sphingopyxis sp.USTB-05,MC-RR was biodegraded at a more rapid biodegradation rate compared with its strain,so that initial MC-RR of 42.3 mg·L -1 was completely biodegraded within 10 h.During the bio-reaction of MC-RR catalyzed by CE,two intermediate metabolites and a dead-end product of MC-RR were observed on HPLC profiles and all of them had similar scanning profiles in the wavelength from 200 to 300 nm,indicating that the group of Adda in all products of MC-RR remained intact.展开更多
Activity fragmentation provides a new approach for understanding the transformation of urban space and function in the information era. Numerous theoretical and empirical studies have been conducted on activity fragme...Activity fragmentation provides a new approach for understanding the transformation of urban space and function in the information era. Numerous theoretical and empirical studies have been conducted on activity fragmentation, but few studies have focused on the fragmentation of leisure activities. This study was intended to extend the extant literature by: 1) analysing the spatio-temporal fragmentation of physical and virtual leisure activities by using a dataset collected in Nanjing, China, and 2) evaluating the reasons of leisure activity fragmentation, as well as the potential spatial effect of activity fragmentation. The results indicated that virtual leisure activities are more fragmented than physical leisure activities, but the fragmentation of physical and virtual leisure activities varies on weekday and weekend, as well as in various locations and urban districts. In addition, the results suggested that sociodemographic factors and information and communication technology(ICT) variables distinctly affect the fragmentation of leisure activities. Meanwhile, the fragmentation of virtual leisure activities may enhance the transformation of traditional urban space by reallocating leisure activity times and locations.展开更多
This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integrati...This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integration of renewable generation and controllable loads. Approaches for modeling aggregated controllable loads are presented and placed in the same control and economic modeling framework as generation resources for interconnection planning studies. Model performance is examined with system parameters that are typical for an interconnection approximately the size of the Western Electricity Coordinating Council(WECC) and a control area about 1/100 the size of the system. These results are used to demonstrate and validate the methods presented.展开更多
Modern corporate situations, characterized by the globalisation of the markets and of the information, highlight the need to link the potential of a not transient growth to the adequate reconciliation of all the expec...Modern corporate situations, characterized by the globalisation of the markets and of the information, highlight the need to link the potential of a not transient growth to the adequate reconciliation of all the expectations converging around the entrepreneurial formula and not only of those attributable to shareholders. In such a defined context, corporate governance tends to evolve from a situation of primary care for the expectations of shareholders (shareholder's view) and for the correlated financial responsibility, to a wide consideration of all the stakeholders (stakeholder's view) and related responsibilities (financial, environmental, social, administrative). The correct carrying out of governance processes requires, therefore, a clear focus on sustainable development and on the related assumption of a concept of global responsibility. The decisions made by the governing bodies must be driven by the purpose to create value in the long term according to conditions of fairness and sustainable development. To sum up, this research aims to deepen the existing connections between corporate governance, sustainable development and value creation on the basis of the empirical analysis of a limited number of listed Italian companies afferent to the public utilities sector. The paper, based on a deductive approach, is composed of two distinct but strictly connected parts: the first theoretical and the second empirical. The empirical research consists of a content analysis of the most recent documents (sustainability reports and annual reports) worked out by the selected companies. The results obtained about the degree respect of sustainable development conditions by each company are linked to the related value dimension (social, economic, competitive and environmental performance) aimed at verifying if the assumption of a corporate governance approach inspired by sustainability is susceptible of favouring the company development in a medium long term. From the delivered research it emerges how public utilities that promote behaviours in line with the sustainability conditions are marked out by stable growth paths. Conversely, the companies that assume a vision mainly addressed to the economic dimension, neglecting the other areas are generally compromised in the performance realized.展开更多
Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as IT...Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance.展开更多
基金The National Natural Science Foundation of China(No60403027)
文摘To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.
基金Sponsored by the National Natural Science Foudnation of China (Grant No. 60072018,60273082)National Outstanding Youth Science Foundation of China (Grant No. 60225007)
文摘In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.
基金funded by the National Key Basic Research Program of China (973 ProgramGrant No.2013CB429701)National Natural Science Foundations of China (Grant Nos.41206050 and 41202081)
文摘In this paper, two sets of gravity and magnetic data were used to study the tectonics of the southern East China Sea and Ryukyu trench-arc system: one data set was from the 'Geological-geophysical map series of China Seas and adjacent areas' database and the other was newly collected by R/VKexue Ⅲ in 2011. Magnetic and gravity data were reorganized and processed using the software MMDP, MGDP and RGIS. In addition to the description of the anomaly patterns in different areas, deep and shallow structure studies were performed by using several kinds of calculation, including a spectrum analysis, upward-continuation of the Bouguer anomaly and horizontal derivatives of the total-field magnetic anomaly. The depth of the Moho and magnetic basement were calculated. Based on the above work, several controversial tectonic problems were discussed. Compared to the shelf area and Ryukyu Arc, the Okinawa Trough has an obviously thinned crust, with the thinnest area having thickness less than 14km in the southern part. The Taiwan-Sinzi belt, which terminates to the south by the NW-SE trending Miyako fault belt, contains the relic volcanic arc formed by the splitting of the paleo Ryukyu volcanic arc as a result of the opening of the Okinawa Trough. As an important tectonic boundary, the strike-slip type Miyako fault belt extends northwestward into the shelf area and consists of several discontinuous segments. A forearc terrace composed of an exotic terrane collided with the Ryukyu Arc following the subduction of the Philippine Sea Plate. Mesozoic strata of varying thicknesses exist beneath the Cenozoic strata in the shelf basin and significantly influence the magnetic pattern of this area. The gravity and magnetic data support the existence of a Great East China Sea, which suggests that the entire southern East China Sea shelf area was a basin in the Mesozoic without alternatively arranged uplifts and depressions, and might have extended southwestward and connected with the northern South China Sea shelf basin.
基金supported by the National Natural Science Foundation of China under Grants No.61272499,No.10990011
文摘Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.
文摘Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.
基金Supported by the State Key Development Program for Basic Research of China(2008CB418105) the National Natural Science Foundation of China(203777008 20621703)+1 种基金 the State Key Joint Laboratory of Environment Simulation and Pollution Control(09K08ESPCT) the Educational Committee of Beijing
文摘A promising bacterial strain for the biodegradation of Microcystins(MCs)was isolated from Dianchi lake in China and identified as Sphingopyxis sp.USTB-05 by the analysis of 16s rDNA.Initial MC-RR of 42.3 mg·L -1 was completely degraded by USTB-05 within 36 h,which was a relatively high biodegradation rate of MC-RR.With the cell-free extract(CE)of Sphingopyxis sp.USTB-05,MC-RR was biodegraded at a more rapid biodegradation rate compared with its strain,so that initial MC-RR of 42.3 mg·L -1 was completely biodegraded within 10 h.During the bio-reaction of MC-RR catalyzed by CE,two intermediate metabolites and a dead-end product of MC-RR were observed on HPLC profiles and all of them had similar scanning profiles in the wavelength from 200 to 300 nm,indicating that the group of Adda in all products of MC-RR remained intact.
基金Under the auspices of National Natural Science Foundation of China(No.41571146,41301166)
文摘Activity fragmentation provides a new approach for understanding the transformation of urban space and function in the information era. Numerous theoretical and empirical studies have been conducted on activity fragmentation, but few studies have focused on the fragmentation of leisure activities. This study was intended to extend the extant literature by: 1) analysing the spatio-temporal fragmentation of physical and virtual leisure activities by using a dataset collected in Nanjing, China, and 2) evaluating the reasons of leisure activity fragmentation, as well as the potential spatial effect of activity fragmentation. The results indicated that virtual leisure activities are more fragmented than physical leisure activities, but the fragmentation of physical and virtual leisure activities varies on weekday and weekend, as well as in various locations and urban districts. In addition, the results suggested that sociodemographic factors and information and communication technology(ICT) variables distinctly affect the fragmentation of leisure activities. Meanwhile, the fragmentation of virtual leisure activities may enhance the transformation of traditional urban space by reallocating leisure activity times and locations.
文摘This paper collects and synthesizes the technical requirements, implementation, and validation methods for quasi-steady agent-based simulations of interconnectionscale models with particular attention to the integration of renewable generation and controllable loads. Approaches for modeling aggregated controllable loads are presented and placed in the same control and economic modeling framework as generation resources for interconnection planning studies. Model performance is examined with system parameters that are typical for an interconnection approximately the size of the Western Electricity Coordinating Council(WECC) and a control area about 1/100 the size of the system. These results are used to demonstrate and validate the methods presented.
文摘Modern corporate situations, characterized by the globalisation of the markets and of the information, highlight the need to link the potential of a not transient growth to the adequate reconciliation of all the expectations converging around the entrepreneurial formula and not only of those attributable to shareholders. In such a defined context, corporate governance tends to evolve from a situation of primary care for the expectations of shareholders (shareholder's view) and for the correlated financial responsibility, to a wide consideration of all the stakeholders (stakeholder's view) and related responsibilities (financial, environmental, social, administrative). The correct carrying out of governance processes requires, therefore, a clear focus on sustainable development and on the related assumption of a concept of global responsibility. The decisions made by the governing bodies must be driven by the purpose to create value in the long term according to conditions of fairness and sustainable development. To sum up, this research aims to deepen the existing connections between corporate governance, sustainable development and value creation on the basis of the empirical analysis of a limited number of listed Italian companies afferent to the public utilities sector. The paper, based on a deductive approach, is composed of two distinct but strictly connected parts: the first theoretical and the second empirical. The empirical research consists of a content analysis of the most recent documents (sustainability reports and annual reports) worked out by the selected companies. The results obtained about the degree respect of sustainable development conditions by each company are linked to the related value dimension (social, economic, competitive and environmental performance) aimed at verifying if the assumption of a corporate governance approach inspired by sustainability is susceptible of favouring the company development in a medium long term. From the delivered research it emerges how public utilities that promote behaviours in line with the sustainability conditions are marked out by stable growth paths. Conversely, the companies that assume a vision mainly addressed to the economic dimension, neglecting the other areas are generally compromised in the performance realized.
文摘Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance.