期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于RFID技术的跨行业应用数据共管模式 被引量:2
1
作者 张辉 黄银龙 +1 位作者 王占斌 赵博 《通信技术》 2011年第2期123-124,127,共3页
射频识别以其非接触、自动采集的技术优势在社会公共涉车管理系统中得以迅速发展。对基于UHF频段的RFID技术进行了深入研究,并对公安、保险、环保、交通等各行业在RFID技术方面的应用进行了深入的调查研究,确定出各行业需要存储在车卡... 射频识别以其非接触、自动采集的技术优势在社会公共涉车管理系统中得以迅速发展。对基于UHF频段的RFID技术进行了深入研究,并对公安、保险、环保、交通等各行业在RFID技术方面的应用进行了深入的调查研究,确定出各行业需要存储在车卡内存上的数据,然后对各种跨行业应用数据的共管模式进行深入探讨,制定出一种较为合理的数据共管模式,为以后基于UHF频段的RFID技术在各行业的推广应用奠定基础。 展开更多
关键词 车卡 超高频 射频识别 数据共管
原文传递
Managing Social Performance A Case of Microfinance
2
作者 Muamer Halilbasic Kenan Crnkic 《Chinese Business Review》 2011年第10期906-923,共18页
Global financial crises might and should be recognized as a potential chance to introduce changes in managing our business, both in financial and other important private and/or public sectors. The prevailing opinion i... Global financial crises might and should be recognized as a potential chance to introduce changes in managing our business, both in financial and other important private and/or public sectors. The prevailing opinion is that a lack of corporative social responsibility is one of the major reasons that lead to global crises occurrence. Nowadays, it is crucial to use the experiences of other industries and sectors which from their very beginning managed to balance finance and social goals at the same time. Microfinance sector is exactly one such sector. This paper is organized as follows: First, we give some overview of different approaches to measuring social performance of microfinance institutions. In this part of the paper we also accent the specifics of microfinance institutions-management within the context of double bottom line. In the second part we focus our analysis on practical implementation of "double bottom line management in Prizma MCO, one of the world pioneers in social performance management, by using their revolutionary poverty scorecard system. Then, we analyze how these social performance data are used in decision-making and how it affects overall performance of the organization. The paper is finished with some conclusions and lessons learned. 展开更多
关键词 social performance management MICROFINANCE SCORECARD
下载PDF
A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group
3
作者 Wei Song Hua Zou +1 位作者 Haowen Liu Jun Chen 《China Communications》 SCIE CSCD 2016年第6期205-216,共12页
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i... Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme. 展开更多
关键词 proxy re-encryption group key management bilinear map encrypted cloud storage
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部