期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
关系性安全与东盟的实践 被引量:13
1
作者 季玲 《世界经济与政治》 CSSCI 北大核心 2020年第9期101-122,158,159,共24页
东盟成立50多年来成功维护了东南亚乃至东亚地区的长期和平、构建了有弹性的地区安全生态,但现有研究均无法充分解释东盟成功的原因及其安全实践背后的行为逻辑。传统国际关系理论在安全问题认识上的局限性源于其实体主义思维和个体主... 东盟成立50多年来成功维护了东南亚乃至东亚地区的长期和平、构建了有弹性的地区安全生态,但现有研究均无法充分解释东盟成功的原因及其安全实践背后的行为逻辑。传统国际关系理论在安全问题认识上的局限性源于其实体主义思维和个体主义方法论与安全关系性之间的张力。要理解和解释东盟安全实践,需要运用关系主义思维、破解安全认识上的个体主义方法论。基于世界政治关系理论关于共在存在、关系性身份和关系理性的基本假设,关系性安全认为,以维系共在关系和追求共享利益为导向的关系性身份确认过程,是实现本体安全与物理安全相统一的可持续安全目标的路径,行为体遵循关系理性的能动和创造性实践是关系性安全目标得以实现的保证。关系性安全从理论上克服了传统安全观对安全利益的孤立界定、对心理安全的忽视以及个体理性导致非理性安全结果等难题,也为理解东盟长期和平的安全生态建构以及多元灵活的安全行为提供了理论工具。 展开更多
关键词 关系性安全 关系身份 关系 安全生态 东盟
原文传递
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
2
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
A software cost model with maintenance and risk costs for safety-critical systems
3
作者 刘宏伟 杨孝宗 +1 位作者 曲峰 董剑 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期584-587,共4页
According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are ... According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained. 展开更多
关键词 safety-critlcal system software reliability growth model software cost model optimal software release time
下载PDF
The Method of Spatially Smoothed Seismicity Parameters in Consideration of Seismotectonic Background and Its Application to Seismic Hazard Estimation
4
作者 Zhang Lifang Lv Yuejun +2 位作者 Peng Yanju Ma Xiaoling Cui Manfeng 《Earthquake Research in China》 2013年第1期121-132,共12页
In this study, the North China seismic region was selected as the study area, and evaluation of seismic hazard using the spatial smoothing seismicity model was performed. Firstly, the study area is divided into grids,... In this study, the North China seismic region was selected as the study area, and evaluation of seismic hazard using the spatial smoothing seismicity model was performed. Firstly, the study area is divided into grids, and some parameters (e. g. b-value, Mo, Me, azimuth and M-L relationship ) for each seismotectonic model were assigned. Secondly, using elliptical smoothing based on a seismotectonic background model, the statistical earthquake incidence rate in each grid is successively calculated. Lastly, the relevant ground motion attenuation relationship is chosen to assess seismic hazard of general sites. The maps for the distribution of horizontal peak ground acceleration with 10% probability of exceedance in 50 years were obtained by using the seismic hazard analysis method based on grid source. This seismicity model simplifies the methodology of probabilistic seismic hazard analysis, especially appropriate for those places where seismic tectonics is not yet clearly known. This method can provide valuable references for seismic zonation and seismic safety assessment for significant engineering projects. 展开更多
关键词 North China seismic region Seismotectonic background region Seismichazard estimation Spatial smoothing approach
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部