The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.展开更多
An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning secur...An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible.展开更多
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect...Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given展开更多
5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease form...5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease forms of mesalazine.However,poor adherence due to frequent daily dosing and a large number of tablets has been shown to be an important barrier to successful management of patients with UC.Recently, new,once-daily formulations of mesalazine,including the unique multi-matrix delivery system and mesalazine granules,were proven to be efficacious in inducing and maintaining remission in mild-to-moderate UC,with a good safety profile comparable to that of other oral mesalazine formulations.In addition,they offer the advantage of a low pill burden and might contribute to increased long-term compliance and treatment success in clinical practice.This editorial summarizes the available literature on the short-and medium-term efficacy and safety of the new once-daily mesalazine formulations.展开更多
Traditionally, organizations assume that compensation/pay and monetary benefits are what all employees need to work harder, be productive, or remain with the company. According to Abraham Maslow, within every person i...Traditionally, organizations assume that compensation/pay and monetary benefits are what all employees need to work harder, be productive, or remain with the company. According to Abraham Maslow, within every person is a hierarchy of five needs: physiological needs, safety needs, social needs, esteem needs, and self-actualization needs Organizations must be able to identify what employees desire to secure optimum performance and to meet the needs of both employees and employers. This research focuses on the generational gap and the significance of intrinsic and extrinsic rewards in the workforce. The purpose and objective of this research are to test the significance of monetary versus non-monetary rewards among the different generations in the organization. A self-designed questionnaire distributed to a multi-generational group of employees of selected organizations was used to collect the analyzed data. Sixty-five (65%) responses were obtained. Secondary data were used to elucidate the needs in this area of study. Because the workforce is predicted to become more diverse in terms of age, organizations will be unlikely to implement one set of rewards for the multiple generations. This is due to the differing expectations and requirements among the generations. However, the results indicate no significant difference in monetary versus non-monetary rewards among the different generations in the workforce.展开更多
Based on the upper bound theorem of limit analysis,the factor of safety for shallow tunnel in saturated soil is calculated in conjunction with the strength reduction technique.To analyze the influence of the pore pres...Based on the upper bound theorem of limit analysis,the factor of safety for shallow tunnel in saturated soil is calculated in conjunction with the strength reduction technique.To analyze the influence of the pore pressure on the factor of safety for shallow tunnel,the power of pore pressure is regarded as a power of external force in the energy calculation.Using the rigid multiple-block failure mechanism,the objective function for the factor of safety is constructed and the optimal solutions are derived by employing the sequential quadratic programming.According to the results of optimization calculation,the factor of safety of shallow tunnel for different pore pressure coefficients and variational groundwater tables are obtained.The parameter analysis shows that the pore pressure coefficient and the location of the groundwater table have significant influence on the factor of safety for shallow tunnel.展开更多
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by...In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.展开更多
Well-preserved specimens of Hamatophyton verticillatum collected from the Upper Devonian (Famennian) Wutong Formation of Chaohu district, Anhui Province, South China, display more complete fertile axes in three orde...Well-preserved specimens of Hamatophyton verticillatum collected from the Upper Devonian (Famennian) Wutong Formation of Chaohu district, Anhui Province, South China, display more complete fertile axes in three orders and multiple divisions. Comparisons indicate that Hamatophyton possibly does not have palmate planate sterile leaves but hook-like linear ones with rare divisions. We propose seven definitive characters of Sphenophyllales: (1) completely whorled lateral organs; (2) sterile leaves; (3) strobili; (4) "sporangiophores" or stalks with reflexed tips bearing sporangia; (5) three- or four-ribbed primary xylem; (6) exarch maturation of primary xylem; and (7) secondary xylem. The Sphenophyllales probably originated from the Iridopteridales based on similarities in whorled lateral organs, ribbed primary xylem and peripheral protoxylem strands. In transition from Iridopteridales to Sphenophyllales, morphological changes involve partially whorled to completely whorled lateral organs, sterile ultimate appendages to leaves, and fertile ultimate appendages to "sporangiophores"/stalks with bracts; anatomical modifications include configuration and maturation of primary xylem, and presence of secondary xylem.展开更多
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div...The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods.展开更多
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.展开更多
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s...Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.展开更多
基金Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000)Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
文摘The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.
基金The National Natural Science Foundation of China(No.60403027,60773191,70771043)the National High Technology Research and Development Program of China(863 Program)(No.2007AA01Z403)
文摘An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible.
基金the National Natural Science Foundation of China
文摘Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given
文摘5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease forms of mesalazine.However,poor adherence due to frequent daily dosing and a large number of tablets has been shown to be an important barrier to successful management of patients with UC.Recently, new,once-daily formulations of mesalazine,including the unique multi-matrix delivery system and mesalazine granules,were proven to be efficacious in inducing and maintaining remission in mild-to-moderate UC,with a good safety profile comparable to that of other oral mesalazine formulations.In addition,they offer the advantage of a low pill burden and might contribute to increased long-term compliance and treatment success in clinical practice.This editorial summarizes the available literature on the short-and medium-term efficacy and safety of the new once-daily mesalazine formulations.
文摘Traditionally, organizations assume that compensation/pay and monetary benefits are what all employees need to work harder, be productive, or remain with the company. According to Abraham Maslow, within every person is a hierarchy of five needs: physiological needs, safety needs, social needs, esteem needs, and self-actualization needs Organizations must be able to identify what employees desire to secure optimum performance and to meet the needs of both employees and employers. This research focuses on the generational gap and the significance of intrinsic and extrinsic rewards in the workforce. The purpose and objective of this research are to test the significance of monetary versus non-monetary rewards among the different generations in the organization. A self-designed questionnaire distributed to a multi-generational group of employees of selected organizations was used to collect the analyzed data. Sixty-five (65%) responses were obtained. Secondary data were used to elucidate the needs in this area of study. Because the workforce is predicted to become more diverse in terms of age, organizations will be unlikely to implement one set of rewards for the multiple generations. This is due to the differing expectations and requirements among the generations. However, the results indicate no significant difference in monetary versus non-monetary rewards among the different generations in the workforce.
基金Project(51178468) supported by the National Natural Science Foundation of ChinaProject(2010bsxt07) supported by the Doctoral Dissertation Innovation Fund of Central South University,China
文摘Based on the upper bound theorem of limit analysis,the factor of safety for shallow tunnel in saturated soil is calculated in conjunction with the strength reduction technique.To analyze the influence of the pore pressure on the factor of safety for shallow tunnel,the power of pore pressure is regarded as a power of external force in the energy calculation.Using the rigid multiple-block failure mechanism,the objective function for the factor of safety is constructed and the optimal solutions are derived by employing the sequential quadratic programming.According to the results of optimization calculation,the factor of safety of shallow tunnel for different pore pressure coefficients and variational groundwater tables are obtained.The parameter analysis shows that the pore pressure coefficient and the location of the groundwater table have significant influence on the factor of safety for shallow tunnel.
文摘In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.
基金supported by the National Natural ScienceFoundation of China(Grant Nos.40772010,40830211)Program for New Century Excellent Talents in theUniversity of China(NCET-06-0012)
文摘Well-preserved specimens of Hamatophyton verticillatum collected from the Upper Devonian (Famennian) Wutong Formation of Chaohu district, Anhui Province, South China, display more complete fertile axes in three orders and multiple divisions. Comparisons indicate that Hamatophyton possibly does not have palmate planate sterile leaves but hook-like linear ones with rare divisions. We propose seven definitive characters of Sphenophyllales: (1) completely whorled lateral organs; (2) sterile leaves; (3) strobili; (4) "sporangiophores" or stalks with reflexed tips bearing sporangia; (5) three- or four-ribbed primary xylem; (6) exarch maturation of primary xylem; and (7) secondary xylem. The Sphenophyllales probably originated from the Iridopteridales based on similarities in whorled lateral organs, ribbed primary xylem and peripheral protoxylem strands. In transition from Iridopteridales to Sphenophyllales, morphological changes involve partially whorled to completely whorled lateral organs, sterile ultimate appendages to leaves, and fertile ultimate appendages to "sporangiophores"/stalks with bracts; anatomical modifications include configuration and maturation of primary xylem, and presence of secondary xylem.
基金National Natural Science Foundation of China(No.61772478)
文摘The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods.
基金supported by the National Key R&D Program of China (2016YFF0204001)the National Key Technology Support Program (2015BAH08F02)+3 种基金the CCF-Venustech Hongyan Research Initiative (2016-009)the PAPD fundthe CICAEET fundthe Guizhou Provincial Key Laboratory of Public Big Data Program
文摘Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
文摘Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.