期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
医院科研院区物业服务全外包模式的实践
1
作者 叶欢 曹敏 +2 位作者 周婷 任杨 王增 《中国医院建筑与装备》 2023年第9期57-61,共5页
通过在医院科研分院区开展物业服务全外包的实践,探讨多院区一体化管理的运行模式,并阐述实践经验、总结运行模式特点、提出建议。在管理人员基于信息化手段的监管下,在医院科研分院区采用物业服务全外包是一种行之有效且经济的管理方式... 通过在医院科研分院区开展物业服务全外包的实践,探讨多院区一体化管理的运行模式,并阐述实践经验、总结运行模式特点、提出建议。在管理人员基于信息化手段的监管下,在医院科研分院区采用物业服务全外包是一种行之有效且经济的管理方式,成功推动了后勤精细化管理。 展开更多
关键词 医院后勤 物业服务 全外包 社会化 科研分院区 一体化管理
下载PDF
车站主体结构全外包防水施工技术
2
作者 薛永斌 《青海水力发电》 2016年第4期17-23,共7页
深圳地铁7号线华强北站采用盖挖逆做法施工,根据场地的水文地质情况、地形条件、施工方法、结构形式、防水标准、使用要求和经济指标综合考虑,采用全外包防水技术。文章结合项目实际情况对车站主体结构全外包防水施工技术进行了详细... 深圳地铁7号线华强北站采用盖挖逆做法施工,根据场地的水文地质情况、地形条件、施工方法、结构形式、防水标准、使用要求和经济指标综合考虑,采用全外包防水技术。文章结合项目实际情况对车站主体结构全外包防水施工技术进行了详细介绍。 展开更多
关键词 地铁车站 全外包防水 施工技术
下载PDF
浅述轨道交通车站全外包防水结构设计 被引量:2
3
作者 许峻峰 《地下工程与隧道》 2007年第4期37-39,共3页
在杭州轨道交通车站全外包防水结构的研究设计中,对车站抗浮设计和内部结构受力机理做了分析,得出了较为合理的设计方式和计算方法,可供今后类似车站结构设计参考。
关键词 轨道交通车站 全外包防水 抗浮 压顶梁 非线性 变形协调
原文传递
浅析企业内部审计外包问题 被引量:3
4
作者 袁雪霁 《知识经济》 2011年第14期118-118,共1页
国外内部审计外包已成为企业提高公司治理的一种方式,而我国内部审计外包这模式尚处在起步阶段。本文主要通过阐述对企业内部审计外包的动因、外包形式介绍,并分析不同外包形式对企业的影响,试图给我国企业进行内部审计外包提供经验和路... 国外内部审计外包已成为企业提高公司治理的一种方式,而我国内部审计外包这模式尚处在起步阶段。本文主要通过阐述对企业内部审计外包的动因、外包形式介绍,并分析不同外包形式对企业的影响,试图给我国企业进行内部审计外包提供经验和路径,发展最适合我国企业发展的外包形式。 展开更多
关键词 内部审计 全外包 部分外
下载PDF
基于价值链视角的内部审计外包方式选择研究 被引量:3
5
作者 聂丹丹 《全国商情》 2010年第19期47-48,56,共3页
内部审计范围的扩大以及内部审计重要性的提升,使得外包成为近年来内部审计活动的发展趋势和理论研究热点。本文从价值链的视角,分析了内部审计在企业价值活动中的增值作用,同时结合我国企业内部审计的现状,提出部分外包内部审计业务是... 内部审计范围的扩大以及内部审计重要性的提升,使得外包成为近年来内部审计活动的发展趋势和理论研究热点。本文从价值链的视角,分析了内部审计在企业价值活动中的增值作用,同时结合我国企业内部审计的现状,提出部分外包内部审计业务是大多数企业当前的现实选择。 展开更多
关键词 价值链分析 内部审计外 全外包 部分外 合作内审
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
6
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
A secure outsourced Turing- equivalent computation scheme against semi-honest workers using fully homomorphic encryption
7
作者 方昊 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期267-271,共5页
A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private in... A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private information retrieval protocols based on fully homomorphic encryption are designed, so that the reading and writing of the tape of the Turing machine, as well as the evaluation of the transition function of the Turing machine, can be performed by the permitted Boolean circuits of fully homomorphic encryption schemes. This scheme overwhelms the Turing-machine-to- circuit conversion approach, which also implements the Turing-equivalent computation. The encoding of a Turing- machine-to-circuit conversion approach is dependent on both the input data and the worst-case runtime. The proposed scheme efficiently provides the confidentiality of both program and data of the delegator in the delegator-worker model of outsourced computation against semi-honest workers. 展开更多
关键词 Turing machine fully homomorphic encryption outsourced computation
下载PDF
Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage 被引量:4
8
作者 LUO Yuchuan FU Shaojing +1 位作者 XU Ming WANG Dongsheng 《China Communications》 SCIE CSCD 2014年第11期114-124,共11页
Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server a... Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient. 展开更多
关键词 cloud computing cloud storage data integrity algebraic signatures datadynamics
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部