期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
地方立法质量提升的路径选择 被引量:1
1
作者 马贵翔 《甘肃理论学刊》 2014年第1期111-115,1,共5页
我国地方性法规数量庞大但质量较低,成为困扰地方立法发展的一个主要问题。提高我国地方立法质量,应当从立法范围的界线把握、立法指向的公权力选择、立法程序的科学化以及解决立法冲突和改进立法技术等方面进行积极探索。具体路径有:... 我国地方性法规数量庞大但质量较低,成为困扰地方立法发展的一个主要问题。提高我国地方立法质量,应当从立法范围的界线把握、立法指向的公权力选择、立法程序的科学化以及解决立法冲突和改进立法技术等方面进行积极探索。具体路径有:准确界定以程序立法为核心的地方立法范围、选择以财政权为核心的控权性立法主旨、完善立法程序、解决立法冲突和改进立法技术等。 展开更多
关键词 程序立法 控权性立法 良性违法
下载PDF
法与民主
2
作者 马惠慧 《长春大学学报》 2011年第9期97-98,共2页
民主作为现代文明的符号在某种程度上领统着生活于其中的人们的视域。本文认为对"民主"一词的由来、基本精义的阐述及法与民主关系的科学揭示将有助于我们实施依法治国方略,正确地把握控权性法律规范,是实施这一方略的关键环节。
关键词 民主 依法治国 控权性法律规范
下载PDF
司法程序公正的含义
3
《资料通讯》 2002年第7期64-65,共2页
关键词 司法程序公正 独立性 民主性 控权性 平等性 公开性 科学性
下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
4
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
5
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
下载PDF
Fuel-optimal trajectory design using solar electric propulsion under power constraints and performance degradation 被引量:4
6
作者 ZHANG Peng LI JunFeng GONG ShengPing 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第6期1090-1097,共8页
The fuel-optimal transfer trajectories using solar electric propulsion are designed considering the power constraints and solar array performance degradation.Three different performance degradation models including li... The fuel-optimal transfer trajectories using solar electric propulsion are designed considering the power constraints and solar array performance degradation.Three different performance degradation models including linear,positive and negative exponential degradations are used in the analysis of three typical rendezvous missions including Apophis,Venus and Ceres,respectively.The optimal control problem is formulated using the calculus of variations and Pontryagin’s maximum principle,which leads to a bang-bang control that is solved by indirect method combined with a homotopic technique.In demonstrating the effects of the power constraints and solar array performance degradation on the power budget and fuel consumption,the time histories of the power profile and the fuel consumptions are compared for the three missions.This study indicates that it is necessary to consider the power constraints and solar array performance degradation for the SEP-based low-thrust trajectory design,espacially for long-duration outbound flights. 展开更多
关键词 fuel-optimal trajectory solar electric propulsion power constraints performance degradation
原文传递
Watermarking Data Cubes
7
作者 郭捷 邱卫东 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期117-121,共5页
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u... We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications. 展开更多
关键词 data cube WATERMARKING digital right management ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部