期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
论文明戏角色制的形成与演变 被引量:3
1
作者 马俊山 《江海学刊》 CSSCI 北大核心 2013年第1期196-201,共6页
文明戏的角色制是一种开放的、风格化的演艺体系。其来源,一是传统戏,二是日本新剧。文明戏舞台上,辛亥革命前后由言论正生扮演主角,"甲寅中兴"后逐渐为滑稽所取代,根本原因是观众兴趣的转移。言论正生确立了"话"... 文明戏的角色制是一种开放的、风格化的演艺体系。其来源,一是传统戏,二是日本新剧。文明戏舞台上,辛亥革命前后由言论正生扮演主角,"甲寅中兴"后逐渐为滑稽所取代,根本原因是观众兴趣的转移。言论正生确立了"话"在新剧演作中的核心地位,能部演员则展现出写实性和生活化演艺的魅力与前景。滑稽的流行,既成就了一批优秀喜剧演员,也夸张地呈现出演员、角色、观众三方的复杂动力关系,启迪了后来话剧演艺的进步。 展开更多
关键词 文明戏 角色制 言论正生 滑稽 表演
下载PDF
青年社工的流失与留驻:从“角色规制”到“身份认同” 被引量:11
2
作者 闵兢 徐永祥 《青年探索》 2018年第4期15-23,共9页
伴随着社会体制改革和政府社会职能的转变,社会工作全面、系统、深刻地影响了中国社会发展的进程。青年社工作为社会工作发展推进的主力军,其流失问题却日趋显著。这不仅关系到社工人才队伍的稳定,还关系到我国社会建设与发展的大局。... 伴随着社会体制改革和政府社会职能的转变,社会工作全面、系统、深刻地影响了中国社会发展的进程。青年社工作为社会工作发展推进的主力军,其流失问题却日趋显著。这不仅关系到社工人才队伍的稳定,还关系到我国社会建设与发展的大局。青年社工的流失问题从本质上来说源于社会结构与政策制度通过"角色规制"形成的对青年社工的规范和约束而导致的角色退出。要使青年社工留驻,则要将外在的"角色规制"转向内在的"身份认同",克服工具理性的悖论,尊重青年社工的价值理性。通过主体性重构与外部空间赋予,实现青年社工"社会自我"与"个体自我"的双向度身份认同及"作为人的社工"和"作为社工的人"的完整统一。 展开更多
关键词 角色 身份认同 青年社工 双向建构
下载PDF
学龄儿童母职角色再制的社会学思考 被引量:4
3
作者 姚岩 《河北师范大学学报(教育科学版)》 CSSCI 北大核心 2018年第2期37-42,共6页
竞争型教育意识形态提升了教育在国内外竞争中的地位,现代社会的开放性推动了"家校合作"的产生,中国公共教育的转型导致教育的公共弱化,私益性增强,这些因素与传统性别角色分工一起再制了当前强调教育优先,以全能型和科学型... 竞争型教育意识形态提升了教育在国内外竞争中的地位,现代社会的开放性推动了"家校合作"的产生,中国公共教育的转型导致教育的公共弱化,私益性增强,这些因素与传统性别角色分工一起再制了当前强调教育优先,以全能型和科学型为目标指向,重视教育消费和担任教师助手的母职角色,加剧了家庭教育的"学校化"倾向,加深了社会性别的不平等,并加强了中产阶层家庭教养话语对劳动阶层的压迫。 展开更多
关键词 学龄儿童 教育 母职 角色 女性主义
下载PDF
职业安全规制问题研究:基于法经济学的视角 被引量:9
4
作者 谢地 何琴 《经济学家》 CSSCI 北大核心 2008年第2期47-54,共8页
控制和减少职业伤害,救济遭受职业伤害的劳动者,维护职业安全,是任何一个民主、法制、健康和谐的社会必须高度重视的社会经济问题,也是政府实施社会性规制的重要领域。我国国民经济高速增长的背后隐藏着巨大的社会成本,包括越来越严重... 控制和减少职业伤害,救济遭受职业伤害的劳动者,维护职业安全,是任何一个民主、法制、健康和谐的社会必须高度重视的社会经济问题,也是政府实施社会性规制的重要领域。我国国民经济高速增长的背后隐藏着巨大的社会成本,包括越来越严重的职业安全问题。各类生产安全事故的频繁发生,职业病发病人数的不断增加,折射出我国劳工状况不容乐观、劳动者权利未能得到有效保护的现实。在建设社会主义和谐社会的大背景下,应该从完善政府社会性规制入手寻求破解之道。 展开更多
关键词 和谐社会 职业安全 角色
下载PDF
Attribute-based access control policy specification language 被引量:6
5
作者 叶春晓 钟将 冯永 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期260-263,共4页
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens... This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way. 展开更多
关键词 role-based access control POLICY XML XACML
下载PDF
Novel scheme to specify and integrate RBAC policy based on ontology 被引量:1
6
作者 孙小林 卢正鼎 +2 位作者 李瑞轩 王治刚 文坤梅 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期394-398,共5页
To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can sup... To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can support and extend the RBAC96 model. The uniform ontology-based description mechanism of secure policies is applied in OntoRBAC, which can be used to describe different secure policies in distributed systems and integrate policies in semantic level with upper concepts. In addition, some rules have been defined to reason within the OntoRBAC to extend the inference algorithms in ontology, which makes the system accommodate itself to RBAC policies better. 展开更多
关键词 ONTOLOGY POLICY role-based access control
下载PDF
A New Role Hierarchy Model for Role Based Access Control 被引量:2
7
作者 吕宜洪 宋瀚涛 龚元明 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期409-413,共5页
A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission ar... A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission are introduced, based on the RRA97 model. Some new role-role inheriting forms such as normal inheritance, private inheritance, public inheritance and special-without inheritance are defined. Based on the ideas mentioned, the new role hierarchy model is formulated. It is easier and more comprehensible to describe role-role relationships through the new model than through the traditional ones. The new model is closer to the real world and its mechanism is more powerful. Particularly it is more suitable when used in large-scale role hierarchies. 展开更多
关键词 RBAC access control ROLE INHERIT role hierarchy
下载PDF
Permission and role automatic assigning of user in role-based access control 被引量:4
8
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
下载PDF
Role based access control design using Triadic concept analysis 被引量:9
9
作者 Ch.Aswani Kumar S.Chandra Mouliswaran +1 位作者 LI Jin-hai C.Chandrasekar 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3183-3191,共9页
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics... Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature. 展开更多
关键词 access control concept lattice role based access control role hierarchy triadic context triadic concept analysis
下载PDF
The Research of Role Tree-Based Access Control Model
10
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based Accessing Control (RBAC) Role Tree-Based Access Control (RTBAC) Models Constraints Permission
下载PDF
Research and Realization of the Role-Based System Access Control Management 被引量:1
11
作者 蔡红 陈荣耀 令狐佳 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期267-269,共3页
The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based acc... The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based access control management which is relatively independent in the applied system. This management achieves the control on user's access by distribution and cancel of role-play,which is a better solution to the problems of the access control management for the applied system. Besides,a complete scheme for the realization of this access control was provided. 展开更多
关键词 access control user distribution
下载PDF
An Indigenous Yoruba Socio-political Model of Conflict Resolution
12
作者 Lawrence Bamikole 《Journal of Philosophy Study》 2013年第2期144-152,共9页
In indigenous and contemporary societies, different elements of social and political institutions have come up with various inner mechanisms that are unique to their societies that can adjudicate in conflict situation... In indigenous and contemporary societies, different elements of social and political institutions have come up with various inner mechanisms that are unique to their societies that can adjudicate in conflict situations. In traditional, indigenous Yoruba societies, agba (elders) were usually relied upon as agents and institutions of conflict resolution in view of certain qualities possessed by this category of people. This paper focuses attention on the role of agba (elders) in conflict resolution at various levels of Yoruba life. We acknowledge that agba (elders) have performed these roles in traditional, indigenous Yoruba societies. The opinion expressed in this paper is that agba, as theoretical and practical conflict resolution mechanism, can be philosophically developed and used as an alternative model to the current means of resolving conflicts through wars and terrorism and other forms of violence by aggrieved individuals and groups in national and international arenas. 展开更多
关键词 agba (elders) indigenous Yoruba society conflict resolution MODEL
下载PDF
Visualization Framework for Inter-Domain Access Control Policy Integration
13
作者 潘理 柳宁 訾小超 《China Communications》 SCIE CSCD 2013年第3期67-75,共9页
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug... The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. 展开更多
关键词 policy visualization policy integration role based access control role mapping
下载PDF
在澳大利亚遵守竞争法:规制者和企业的不同对策 被引量:1
14
作者 迪波拉·希尔利 张舒 《经济法论丛》 CSSCI 2013年第2期371-393,共23页
澳大利亚竞争法体系完善,被认为对增进整个经济和消费者的利益起到了很大作用。这些法律由澳大利亚竞争和消费者委员会(ACCC)有力的执行。ACCC在执行中所采取的立场、实践中的作为,以及企业应当如何保证其对竞争法的遵守等问题,为其他... 澳大利亚竞争法体系完善,被认为对增进整个经济和消费者的利益起到了很大作用。这些法律由澳大利亚竞争和消费者委员会(ACCC)有力的执行。ACCC在执行中所采取的立场、实践中的作为,以及企业应当如何保证其对竞争法的遵守等问题,为其他竞争法法域提供一些有益经验,亦对企业在其他法域设立守法项目提供了指引。 展开更多
关键词 竞争法 角色 ACCC 执行 企业守法实践
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部