期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
处理企业集访事件应实现“五个转变”
1
作者 柳小花 《办公室业务》 2015年第10期43-,共1页
本文分析了新时期企业集访的成因,根据作者在工作实践中的体会,认为处理和化解企业集访应做到"五个转变"。
关键词 企业 集访 成因 化解
下载PDF
谈集访事件的处置和预防
2
作者 胡楠 胡光俭 《管理观察》 2009年第18期56-58,共3页
本文通过对当前基层群众性集体上访事件性质和特点的研究,结合当前对处置群众性集体上访事件的各种观点与做法,提出发展经济,提高广大人民群众的物质文化生活水平是减少集访事件的治标之本;加强法制宣传教育是预防和处理集访事件的治本... 本文通过对当前基层群众性集体上访事件性质和特点的研究,结合当前对处置群众性集体上访事件的各种观点与做法,提出发展经济,提高广大人民群众的物质文化生活水平是减少集访事件的治标之本;加强法制宣传教育是预防和处理集访事件的治本之策。 展开更多
关键词 集访事件 标本兼治 预防
下载PDF
三峡库区“后移民时期”若干重大社会问题分析——区域性社会问题凸显的原因及对策建议 被引量:28
3
作者 孙元明 《中国软科学》 CSSCI 北大核心 2011年第6期24-33,共10页
进入"后移民时期"后,三峡库区"移民‘返流’"、"群体性规模集访"、"产业空虚化综合症"、"社会心态环境脆弱"和"移民‘利益群体’形成"等区域性社会问题相继浮出水面。通... 进入"后移民时期"后,三峡库区"移民‘返流’"、"群体性规模集访"、"产业空虚化综合症"、"社会心态环境脆弱"和"移民‘利益群体’形成"等区域性社会问题相继浮出水面。通过对这些现象和行为的成因分析,认为"非自愿移民"和"介入性贫困"是产生三峡库区社会问题的症结。为了准确反映迁移对移民实际生活的影响,本文提出一种新的移民分类标准,对三峡库区在这一新时期社会发展战略的思路、工作目标和解决社会问题途径进行了探讨,提出建设国家级生态经济特区;探索减低维护三峡生态政治成本的体制改革;以《三峡库区后续规划》实施为契机偿还历史欠账;实施对重大社会问题的综合治理;放开三峡库区的议题设置和建立社会风险预测预警系统等多项对策建议。 展开更多
关键词 后移民时期 社会问题 移民返流 群体性规模集访 共谋行为
下载PDF
An application-layer based centralized information access control for VPN 被引量:2
4
作者 欧阳凯 周敬利 +1 位作者 夏涛 余胜生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期240-249,共10页
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality... With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper. 展开更多
关键词 Virtual private network Access control TUNNELING Centralized management STREAM
下载PDF
Visualization Framework for Inter-Domain Access Control Policy Integration
5
作者 潘理 柳宁 訾小超 《China Communications》 SCIE CSCD 2013年第3期67-75,共9页
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug... The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. 展开更多
关键词 policy visualization policy integration role based access control role mapping
下载PDF
Joining Hands for New Splendor In the New Era
6
作者 Xi Jinping 《Beijing Review》 2018年第51期I0001-I0004,共4页
I am delighted to visit Spain,a beautiful and richly endowed kingdom,at the kind invitation of King Felipe VI.This will be the first stop of my trip that takes me to Europe and Latin America for state visits and for t... I am delighted to visit Spain,a beautiful and richly endowed kingdom,at the kind invitation of King Felipe VI.This will be the first stop of my trip that takes me to Europe and Latin America for state visits and for the G20Buenos Aires Summit. 展开更多
关键词 visit Spain richly endowed kingdom King Felipe VI
原文传递
Energy adaptive MAC protocol for IEEE 802.15.7 with energy harvesting
7
作者 汪红桥 迟学芬 赵琳琳 《Optoelectronics Letters》 EI 2016年第5期370-374,共5页
The medium access control(MAC) protocol for indoor visible light communication(VLC) with energy harvesting is explored in this paper. The unfairness of throughput exists among devices due to the significant difference... The medium access control(MAC) protocol for indoor visible light communication(VLC) with energy harvesting is explored in this paper. The unfairness of throughput exists among devices due to the significant difference of their energy harvesting rates which changes with distance, acceptance angle and the obstruction probability. We propose an energy harvesting model, a new obstruction probability model and an energy adaptive contention algorithm to overcome the unfairness problem. This device can adjust its contention window according to the energy harvesting rate. As a result, the device with lower energy harvesting rate can get shorter contention window to improve its transmission opportunity. Simulation results show that our MAC protocol can achieve a higher degree of fairness. 展开更多
关键词 harvesting throughput opportunity obstruction adjust transmit overcome acket acceptance CSMA
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部