期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
论坟墓上寄寓的权利:死者的安息权与后代的监护权——基于宪法权利的视角 被引量:4
1
作者 夏泽祥 《政治与法律》 CSSCI 北大核心 2013年第5期59-69,共11页
周口"平坟运动"一直在负面舆论中高调推进,直到国务院将《殡葬管理条例》中授权民政部门"强制执行"的语句删除之后才偃旗息鼓。这表明,国务院的决策者们默认了文化界人士对"平坟运动"的批评意见,即坟墓... 周口"平坟运动"一直在负面舆论中高调推进,直到国务院将《殡葬管理条例》中授权民政部门"强制执行"的语句删除之后才偃旗息鼓。这表明,国务院的决策者们默认了文化界人士对"平坟运动"的批评意见,即坟墓是祖神信仰和孝道文化的载体,故"平坟运动"不仅侵犯了民众的信仰自由和情感,而且破坏了中国的传统文化。为加强对坟墓的保护,可将坟墓上承载的价值归纳为死者的安息权及其后代对祖坟的监护权。这两种权利属于消极权利、应有权利,其向实有权利的转化,既有赖于国家权力的自我谦抑,也有赖于民众对平坟举措的抵制。 展开更多
关键词 “平坟运动” 安息权 监护 殡葬文化 宪法
下载PDF
SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION 被引量:2
2
作者 Guo Yanqing Kong Xiangwei You Xingang 《Journal of Electronics(China)》 2009年第2期285-288,共4页
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,deve... The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography. 展开更多
关键词 Secure steganography Integer Programming(IP) Binary Particle Swarm Optimization(BPSO)
下载PDF
A Descriptive Research With Family Farmers' Beneficiaries and Non-beneficiaries of the PRONAF in the Municipality of Itapuranga, State of Goias, Brazil
3
作者 Waltuir Batista Machado Luiz Manoel de Moraes Camargo Almeida Odilon Jose de Oliveira Neto 《Sociology Study》 2013年第4期289-299,共11页
This article is a part of a descriptive survey which aims to characterize, classify, and compare the household production in the Municipality of Itapuranga, State of Goias, Brazil, considering the access to the Nation... This article is a part of a descriptive survey which aims to characterize, classify, and compare the household production in the Municipality of Itapuranga, State of Goias, Brazil, considering the access to the National Program for Strengthening Family Agriculture (PRONAF) and its respective differentiation between beneficiary and non-beneficiary groups by the program. It applied the technique of group comparison analysis and frequency inquiry, taking into consideration several variables. Information about the origin, distribution and total income, food safety, land property, production diversification, expenditures and participation in social organizations were collected. The sample consisted of 70 producers, the calculation sample was defined by determined value at the confidence level of 90% whereas the sampling error of 7%. The results allowed describing, classifying, characterizing, and comparing the socio-economic and productive profile of farmers from that area and their access to PRONAF. 展开更多
关键词 Agricultural funding family agriculture food safety PRONAF public policy
下载PDF
Personal Delegation by Persona Creation
4
作者 Coimbatore S. Chandersekaran William R. Simpson 《Computer Technology and Application》 2011年第6期413-423,共11页
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ... There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required. 展开更多
关键词 DELEGATION enterprise information security least privilege ATTRIBUTION information sharing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部