The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the...The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.展开更多
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in...The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.展开更多
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we p...Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs.展开更多
The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integ...The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integration Informatization Model, the Flow Management Informatization Model, the Intranet E-commerce Informatization Model and the Network Enterprise Informatization Model. The conditions for using and problems needing attentions of these 4 models are also analyzed.展开更多
Colonial New England urban economy was growing prosperity from 17th century to 18th century, all kinds of urban public space was increasing in number, the increasingly rich on the function, which became important plac...Colonial New England urban economy was growing prosperity from 17th century to 18th century, all kinds of urban public space was increasing in number, the increasingly rich on the function, which became important place for colonial population aggregation and consumption. What people from different place come into the big and small cafes, taverns, shops, and the most important Town House took sharing information, emotional communication, business negotiation and other matters, which reflecting the colonial town's economic and social progress.展开更多
This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application...This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application for monitoring equipment with e-mail is given.展开更多
IPv6 has been an inevitable trend with the depletion of the global IPv4 address space. However, new IPv6 users still need public IPv4 addresses to access global IPv4 users/resources, making it important for providers ...IPv6 has been an inevitable trend with the depletion of the global IPv4 address space. However, new IPv6 users still need public IPv4 addresses to access global IPv4 users/resources, making it important for providers to share scarce global IPv4 addresses effectively. There are two categories of solutions to the problem, carrier-grade NAT (CGN) and 'A+P' (each customer shaving the same IPv4 address is assigned an excluded port range). However, both of them have limitations. Specifically, CGN solutions are not scalable and can bring much complexity in managing customers in large-scale deployments, while A+P solutions are not flexible enough to meet dynamic port requirements. In this paper, we propose a hybrid mechanism to improve current solutions and have deployed it in the Tsinghua University Campus Network. The real traffic data shows that our mechanism can utilize limited IPv4 addresses efficiently without degrading the performance of applications on end hosts. Based on the enhanced mechanism, we propose a method to help service providers make address plans based on their own traffic patterns and actual requirements.展开更多
基金Supported by Education Reform,Innovation and Guidance Program for Teachers in Universities of Tian Jin Agricultural University(20170405)~~
文摘The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.
基金supported in part by the National Nature Science Foundation of China under Grant No.61402413 and 61340058 the "Six Kinds Peak Talents Plan" project of Jiangsu Province under Grant No.ll-JY-009+2 种基金the Nature Science Foundation of Zhejiang Province under Grant No.LY14F020019, Z14F020006 and Y1101183the China Postdoctoral Science Foundation funded project under Grant No.2012M511732Jiangsu Province Postdoctoral Science Foundation funded project Grant No.1102014C
文摘The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.
基金This work has been supported by the National Natural Science Foundation of China under Grant No.61272519,the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20120005110017,and the National Key Technology R&D Program under Grant No.2012BAH06B02
文摘Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs.
文摘The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integration Informatization Model, the Flow Management Informatization Model, the Intranet E-commerce Informatization Model and the Network Enterprise Informatization Model. The conditions for using and problems needing attentions of these 4 models are also analyzed.
文摘Colonial New England urban economy was growing prosperity from 17th century to 18th century, all kinds of urban public space was increasing in number, the increasingly rich on the function, which became important place for colonial population aggregation and consumption. What people from different place come into the big and small cafes, taverns, shops, and the most important Town House took sharing information, emotional communication, business negotiation and other matters, which reflecting the colonial town's economic and social progress.
基金Foundation item: Project supported by the national Natural Science Foundation, China (Grant No. 59990470)
文摘This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application for monitoring equipment with e-mail is given.
文摘IPv6 has been an inevitable trend with the depletion of the global IPv4 address space. However, new IPv6 users still need public IPv4 addresses to access global IPv4 users/resources, making it important for providers to share scarce global IPv4 addresses effectively. There are two categories of solutions to the problem, carrier-grade NAT (CGN) and 'A+P' (each customer shaving the same IPv4 address is assigned an excluded port range). However, both of them have limitations. Specifically, CGN solutions are not scalable and can bring much complexity in managing customers in large-scale deployments, while A+P solutions are not flexible enough to meet dynamic port requirements. In this paper, we propose a hybrid mechanism to improve current solutions and have deployed it in the Tsinghua University Campus Network. The real traffic data shows that our mechanism can utilize limited IPv4 addresses efficiently without degrading the performance of applications on end hosts. Based on the enhanced mechanism, we propose a method to help service providers make address plans based on their own traffic patterns and actual requirements.