In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This me...In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model.The manual retrieval and analysis involved in this transition are inefficient,prone to errors,and costly.Most organizations have high-level specifications defined for security policies that include a set of access control policies,which often exist in the form of natural language documents.Utilizing this rich source of information,our method effectively identifies and extracts the necessary attributes and rules for access control from natural language documents,thereby constructing and optimizing access control policies.This work transforms the problem of policy automation generation into two tasks:extraction of access control statements andmining of access control attributes.First,the Chat General Language Model(ChatGLM)isemployed to extract access control-related statements from a wide range of natural language documents by constructing unique prompts and leveraging the model’s In-Context Learning to contextualize the statements.Then,the Iterated Dilated-Convolutions-Conditional Random Field(ID-CNN-CRF)model is used to annotate access control attributes within these extracted statements,including subject attributes,object attributes,and action attributes,thus reassembling new access control policies.Experimental results show that our method,compared to baseline methods,achieved the highest F1 score of 0.961,confirming the model’s effectiveness and accuracy.展开更多
Aimed at infinite horizon optimal control problems of discrete time-varying nonlinear systems,in this paper,a new iterative adaptive dynamic programming algorithm,which is the discrete-time time-varying policy iterati...Aimed at infinite horizon optimal control problems of discrete time-varying nonlinear systems,in this paper,a new iterative adaptive dynamic programming algorithm,which is the discrete-time time-varying policy iteration(DTTV)algorithm,is developed.The iterative control law is designed to update the iterative value function which approximates the index function of optimal performance.The admissibility of the iterative control law is analyzed.The results show that the iterative value function is non-increasingly convergent to the Bellman-equation optimal solution.To implement the algorithm,neural networks are employed and a new implementation structure is established,which avoids solving the generalized Bellman equation in each iteration.Finally,the optimal control laws for torsional pendulum and inverted pendulum systems are obtained by using the DTTV policy iteration algorithm,where the mass and pendulum bar length are permitted to be time-varying parameters.The effectiveness of the developed method is illustrated by numerical results and comparisons.展开更多
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy...Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.展开更多
This paper examines project⁃based policies and regulations implemented globally to control and mitigate emissions from diesel⁃powered construction equipment.This study systematically reviews and analyzes various manag...This paper examines project⁃based policies and regulations implemented globally to control and mitigate emissions from diesel⁃powered construction equipment.This study systematically reviews and analyzes various managerial,regulatory,and technical measures adopted across countries and regions,mostly of advanced economy.Key strategies of control include setting emission thresholds,idling restrictions,perform remote online monitoring,operational time limits,setting low emission zones,and enforced registration systems.The review highlights the rationale,implementation details,and experiences gained from these localized approaches,reduces localized emission sources,improve urban air quality and environmental management efficiency.展开更多
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens...This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way.展开更多
From the perspective of the process of urbanization,this paper puts forward the corresponding public policy control by analyzing the characteristics of " hollowing" at different stages of urbanization. Moreo...From the perspective of the process of urbanization,this paper puts forward the corresponding public policy control by analyzing the characteristics of " hollowing" at different stages of urbanization. Moreover,the paper focuses on the stage of China's current urbanization.Based on the survey of migrant workers,this paper evaluates China's current policies,and argues that the rural " hollowing" is an objective that accompanies urbanization. At different stages of the process of urbanization,the rural " hollowing" presents different characteristics. Local governments should make policy and plan based on the different stages of local urbanization and local conditions,because of the extent of regional differences in economic and social development. This paper aims to guide the rural " hollowing" to develop toward the right direction.展开更多
Introduction: The incidence and severity of Clostridium difficile infection (CDI) has been increasing and long-term care facility (LTCF) residents are at high risk given their age, co-morbidities, and high antibiotic ...Introduction: The incidence and severity of Clostridium difficile infection (CDI) has been increasing and long-term care facility (LTCF) residents are at high risk given their age, co-morbidities, and high antibiotic exposure. Infection control policies are crucial for controlling CDI, but there are currently no regulatory guidelines in the United States. Therefore, we evaluated infection control policies in local LTCFs to define the CDI-specific policies and the administrative and staff understanding of CDI, so as to identify perceived barriers for compliance. Methods: IRB approval was sought and exemption granted, all 8 local LTCFs were asked to participate. Each facility was visited by study personnel who interviewed the administrative Infection Control Practitioner (ICP) and 3-4 Licensed Practical Nurses (LPNs) with distinct survey format. Infection control policies were then compared to the SHEA recommendations for CDI in LTCFs. Results: Of the eligible facilities, 75% (n = 6) participated. ICP (n = 6) and LPNs (n = 21) were interviewed. All facilities accept residents with active CDI and 2 had written CDI-specific infection control policies. All facilities had hand hygiene or glove use policies and 2 had policies for the use of sporicidal environmental cleaning. No facility restricted antibiotic use. Each facility has a policy to instruct their staff through in-services, either annually or upon new hire, but 33% (n = 7) LPNs reported no facility-based CDI training. While 80% (n = 17) of LPNs felt comfortable with the facility CDI policies, only 11 accurately restated it. ICPs felt the most relevant barrier to staff compliance was time constraints (n = 4, 67%), however, LPNs felt it was limited knowledge (n = 10, 48%) and poor communication (n = 2, 10%). Discussion and Conclusions: With the increasing incidence and severity of CDI in LCTF, few of the facilities surveyed had CDI-specific policies. Despite CDI-specific training, there is a perceived knowledge and communication gap for staff caring for residents with CDI.展开更多
In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies ...In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies in communication network,a policy-based TCoD network model is given and a comprehensive evaluation index system of the network effectiveness is put forward from both network application and handling mechanism perspectives. A TCoD network prototype system based on Asynchronous Transfer Mode/Multi-Protocol Label Switching (ATM/MPLS) is introduced and some experiments are performed on it. The prototype system is evaluated and analyzed with the comprehensive evaluation index system. The results show that the index system can be used to judge whether the communication network can meet the application requirements or not,and can provide references for the optimization of the transport policies so as to improve the communication network effectiveness.展开更多
The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in...The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in academia about the establishment of "weak" and "narrow" versions of PH. Based on the panel data of application for patent of energy conservation and emission reduction(ECER) technology of Chinese city scale during 2008-2014, comprehensive energy price, pollutant emission, etc., mixed regression model and systematic generalized method of moments method were adopted, respectively,to study the impact of market-oriented and command-and-control policy tool on China's ECER technology innovation. The results show that the environmental regulation hindered the technological innovation in the immediate phase; however, it turned out to be positive in the first-lag phase. Hence, the establishment of "weak" PH is time-bounded. The command-and-control policy tool played a more positive role in promoting technological innovation in the first-lag phase than market-oriented policy tool. Therefore, "narrow" PH is not tenable. The reason is that the main participants of China's ECER technology innovation are state-owned companies and public institutions. Regionally speaking, the impact which command-and-control policy tool has on technological innovation at sight was nonsignificant in the eastern, the central, and the western regions of China whilst market-oriented policy tool had a negative effect. And market-oriented policy tool in the central region had strongest negative effect, which would diminish in the eastern region and become weakest in the western region. This was related to regional energy consumption level and the market economic vitality.展开更多
Loess Plateau is the most serious region of soil and water loss in China and the world. The sediment carried into the Yellow River amounts to 1.6 billion tons every year. This paper reviews the factors and reasons for...Loess Plateau is the most serious region of soil and water loss in China and the world. The sediment carried into the Yellow River amounts to 1.6 billion tons every year. This paper reviews the factors and reasons for erosion in this area, and puts forward a comprehensive controlling policy on the basis of the principles of ecology and practise of Chinese scientists for 40 years. In conformity with the policy, a number of technical measures for controlling soil and water loss are suggested.展开更多
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug...The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result.展开更多
Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,con...Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme.展开更多
Since COVID-19 was declared as a pandemic in March 2020,the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment.This paper uses a novel Bi-Level Dynamic Optimal Cont...Since COVID-19 was declared as a pandemic in March 2020,the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment.This paper uses a novel Bi-Level Dynamic Optimal Control model(BLDOC)to coordinate control between COVID-19 and unemployment.The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model.The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals,and at the same time minimizing the cost of the containment strategies.We use the modified approximation Karush–Kuhn–Tucker(KKT)conditions with the Hamiltonian function to handle the bi-level dynamic optimal control model.We consider three control variables:The first control variable relates to government measures to curb the COVID-19 pandemic,i.e.,quarantine,social distancing,and personal protection;and the other two control variables relate to government interventions to reduce the unemployment rate,i.e.,employment,making individuals qualified,creating new jobs reviving the economy,reducing taxes.We investigate four different cases to verify the effect of control variables.Our results indicate that rather than focusing exclusively on only one problem,we need a balanced trade-off between controlling each.展开更多
BACKGROUND Coronavirus disease 2019(COVID-19)is an emerging,rapidly evolving disease that spreads through the respiratory system and is highly contagious.In March 2020,the World Health Organization declared the COVID-...BACKGROUND Coronavirus disease 2019(COVID-19)is an emerging,rapidly evolving disease that spreads through the respiratory system and is highly contagious.In March 2020,the World Health Organization declared the COVID-19 outbreak a pandemic.In China,the pandemic was controlled after 2 mo through effective policies and containment measures.Describing the detailed policies and containment measures used to control the epidemic in Chongqing will provide a reference for the prevention and control of COVID-19 in other areas of the world.AIM To explore the effects of different policies and containment measures on the control of the COVID-19 epidemic in Chongqing.METHODS Epidemiological data on COVID-19 in Chongqing were prospectively collected from January 21 to March 15,2020.The policies and prevention measures implemented by the government during the epidemic period were also collected.Trend analysis was performed to explore the impact of the main policy measures on the effectiveness of the control of COVID-19 in Chongqing.As of March 15,the cumulative incidence of COVID-19 in Chongqing was 1.84/100000(576 cases)and the infection fatality rate was 1.04%(6/576).The spread of COVID-19 was controlled by effective policies that involved establishing a group for directing the COVID-19 epidemic control effort;strengthening guidance and supervision;ensuring the supply of daily necessities and medical supplies and equipment to residents;setting up designated hospitals;implementing legal measures;and enhancing health education.Medical techniques were implemented to improve the recovery rate and control the epidemic.Policies such as“the lockdown of Wuhan”,“initiating a first-level response to major public health emergencies”,and“implementing the closed management of residential communities”significantly curbed the spread of COVID-19.Optimizing the diagnosis process,shortening the diagnosis time,and constructing teams of clinical experts facilitated the provision of“one team of medical experts for each patient”treatment for severe patients,which significantly improved the recovery rate and reduced the infection fatality rate.CONCLUSION The prevention policies and containment measures implemented by the government and medical institutions are highly effective in controlling the spread of the epidemic and increasing the recovery rate of COVID-19 patients.展开更多
In the process of economic development, government uses the "visible hand" to achieve macroeconomic regulation and control for "market failure", which has been common knowledge among people after W...In the process of economic development, government uses the "visible hand" to achieve macroeconomic regulation and control for "market failure", which has been common knowledge among people after World War II. Comparing policy and means adopted by Chinese and foreign governments in macro regulation and control, we can see that the choice is different in different historical periods and the change of emphasis in macro regulation and control policy and means has the convergence tendency. We can make the following conclusion from research of the change rules of macro regulation and control means in the market economic condition of Chinese and foreign governments: supply-side structural reform in China complies with the basic rules of development of market economy.展开更多
With the rapid development of economy and motorization, the traffic congestion and environmental problems have become more and more serious day by day in Beijing. Therefore, traffic control policies have been graduall...With the rapid development of economy and motorization, the traffic congestion and environmental problems have become more and more serious day by day in Beijing. Therefore, traffic control policies have been gradually adopted by Beijing municipal government since 2008, so as to ease traffic and environmental problems. In this paper, the background and current situation of Beijing to implement traffic control policies are introduced, and also this measure is analyzed and evaluated from traffic effect, environmental effect, motor vehicle development, urban road development, public transport development, and balance between supply and demand, etc. Finally, related conclusions are drawn up as follows: an induced traffic volume will be generated by traffic control policies, and the effect of the traffic control will be erased by the natural growth rate of motor vehicles in three years; public traffic service should be improved for better making traffic control policies; the traffic congestion and environmental problems are alleviated by traffic control policies in the short term, but can't be fundamentally solved in the long run; traffic control policies should cooperate with other traffic demand management policies for reducing demands, and traffic condition should be optimized in both time and space, so that the traffic congestion and environmental problems will be fundamentally solved.展开更多
In this paper, we consider the optimal risk sharing problem between two parties in the insurance business: the insurer and the insured. The risk is allocated between the insurer and the insured by setting a deductible...In this paper, we consider the optimal risk sharing problem between two parties in the insurance business: the insurer and the insured. The risk is allocated between the insurer and the insured by setting a deductible and coverage in the insurance contract. We obtain the optimal deductible and coverage by considering the expected product of the two parties' utilities of terminal wealth according to stochastic optimal control theory. An equilibrium policy is also derived for when there are both a deductible and coverage;this is done by modelling the problem as a stochastic game in a continuous-time framework. A numerical example is provided to illustrate the results of the paper.展开更多
Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely ...Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely used in distributed environment as a declaratively fine-grained,attribute-based access control policy language,but the policy integration of XACML lacks formal description and theory foundation.Multicloud Access Control Policy Integration Framework(MACPIF)is proposed in the paper,which consists of Attribute-based Policy Evaluation Model(ABPEM),Four-value Logic with Completeness(FLC)and Four-value Logic based Policy Integration Operators(FLPIOs).ABPEM evaluates access control policy and extends XACML decision to four-value.According to policy decision set and policy integration characteristics,we construct FLC and define FLPIOs including Intersection,Union,Difference,Implication and Equivalence.We prove that MACPIF can achieve policy monotonicity,functional completeness,canonical suitability and canonical completeness.Analysis results show that this framework can meet the requirements of policy integration in Multicloud.展开更多
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident...Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices.The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block encryption and BLAKE hashing technique.An improved Pairing-Free-Ciphertext policy Attribute-based encryption algorithm has been developed to overcome the aforementioned challenges.Further,a comparative study has been performed between the proposed scheme and the different encryption algorithms.It is found that the proposed scheme scores well over the already existing schemes.The scheme is evaluated in terms of execution time and communication overhead.The robustness of the proposed scheme is also analyzed from the perspective of several security goals.展开更多
基金supported by the National Natural Science Foundation of China Project(No.62302540),please visit their website at https://www.nsfc.gov.cn/(accessed on 18 June 2024)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020),Further details can be found at http://xt.hnkjt.gov.cn/data/pingtai/(accessed on 18 June 2024)Natural Science Foundation of Henan Province Youth Science Fund Project(No.232300420422),you can visit https://kjt.henan.gov.cn/2022/09-02/2599082.html(accessed on 18 June 2024).
文摘In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model.The manual retrieval and analysis involved in this transition are inefficient,prone to errors,and costly.Most organizations have high-level specifications defined for security policies that include a set of access control policies,which often exist in the form of natural language documents.Utilizing this rich source of information,our method effectively identifies and extracts the necessary attributes and rules for access control from natural language documents,thereby constructing and optimizing access control policies.This work transforms the problem of policy automation generation into two tasks:extraction of access control statements andmining of access control attributes.First,the Chat General Language Model(ChatGLM)isemployed to extract access control-related statements from a wide range of natural language documents by constructing unique prompts and leveraging the model’s In-Context Learning to contextualize the statements.Then,the Iterated Dilated-Convolutions-Conditional Random Field(ID-CNN-CRF)model is used to annotate access control attributes within these extracted statements,including subject attributes,object attributes,and action attributes,thus reassembling new access control policies.Experimental results show that our method,compared to baseline methods,achieved the highest F1 score of 0.961,confirming the model’s effectiveness and accuracy.
基金supported in part by Fundamental Research Funds for the Central Universities(2022JBZX024)in part by the National Natural Science Foundation of China(61872037,61273167)。
文摘Aimed at infinite horizon optimal control problems of discrete time-varying nonlinear systems,in this paper,a new iterative adaptive dynamic programming algorithm,which is the discrete-time time-varying policy iteration(DTTV)algorithm,is developed.The iterative control law is designed to update the iterative value function which approximates the index function of optimal performance.The admissibility of the iterative control law is analyzed.The results show that the iterative value function is non-increasingly convergent to the Bellman-equation optimal solution.To implement the algorithm,neural networks are employed and a new implementation structure is established,which avoids solving the generalized Bellman equation in each iteration.Finally,the optimal control laws for torsional pendulum and inverted pendulum systems are obtained by using the DTTV policy iteration algorithm,where the mass and pendulum bar length are permitted to be time-varying parameters.The effectiveness of the developed method is illustrated by numerical results and comparisons.
基金partly supported by the University of Malaya Impact Oriented Interdisci-plinary Research Grant under Grant IIRG008(A,B,C)-19IISS.
文摘Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
基金Research Grants Council of the Hong Kong Special Administrative Region,China(U15239024)。
文摘This paper examines project⁃based policies and regulations implemented globally to control and mitigate emissions from diesel⁃powered construction equipment.This study systematically reviews and analyzes various managerial,regulatory,and technical measures adopted across countries and regions,mostly of advanced economy.Key strategies of control include setting emission thresholds,idling restrictions,perform remote online monitoring,operational time limits,setting low emission zones,and enforced registration systems.The review highlights the rationale,implementation details,and experiences gained from these localized approaches,reduces localized emission sources,improve urban air quality and environmental management efficiency.
基金The National High Technology Research and Development Program of China(863Program)(No.2007AA01Z445)
文摘This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way.
文摘From the perspective of the process of urbanization,this paper puts forward the corresponding public policy control by analyzing the characteristics of " hollowing" at different stages of urbanization. Moreover,the paper focuses on the stage of China's current urbanization.Based on the survey of migrant workers,this paper evaluates China's current policies,and argues that the rural " hollowing" is an objective that accompanies urbanization. At different stages of the process of urbanization,the rural " hollowing" presents different characteristics. Local governments should make policy and plan based on the different stages of local urbanization and local conditions,because of the extent of regional differences in economic and social development. This paper aims to guide the rural " hollowing" to develop toward the right direction.
文摘Introduction: The incidence and severity of Clostridium difficile infection (CDI) has been increasing and long-term care facility (LTCF) residents are at high risk given their age, co-morbidities, and high antibiotic exposure. Infection control policies are crucial for controlling CDI, but there are currently no regulatory guidelines in the United States. Therefore, we evaluated infection control policies in local LTCFs to define the CDI-specific policies and the administrative and staff understanding of CDI, so as to identify perceived barriers for compliance. Methods: IRB approval was sought and exemption granted, all 8 local LTCFs were asked to participate. Each facility was visited by study personnel who interviewed the administrative Infection Control Practitioner (ICP) and 3-4 Licensed Practical Nurses (LPNs) with distinct survey format. Infection control policies were then compared to the SHEA recommendations for CDI in LTCFs. Results: Of the eligible facilities, 75% (n = 6) participated. ICP (n = 6) and LPNs (n = 21) were interviewed. All facilities accept residents with active CDI and 2 had written CDI-specific infection control policies. All facilities had hand hygiene or glove use policies and 2 had policies for the use of sporicidal environmental cleaning. No facility restricted antibiotic use. Each facility has a policy to instruct their staff through in-services, either annually or upon new hire, but 33% (n = 7) LPNs reported no facility-based CDI training. While 80% (n = 17) of LPNs felt comfortable with the facility CDI policies, only 11 accurately restated it. ICPs felt the most relevant barrier to staff compliance was time constraints (n = 4, 67%), however, LPNs felt it was limited knowledge (n = 10, 48%) and poor communication (n = 2, 10%). Discussion and Conclusions: With the increasing incidence and severity of CDI in LCTF, few of the facilities surveyed had CDI-specific policies. Despite CDI-specific training, there is a perceived knowledge and communication gap for staff caring for residents with CDI.
基金Supported by the National 863 Program (No.2007AA-701210)
文摘In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies in communication network,a policy-based TCoD network model is given and a comprehensive evaluation index system of the network effectiveness is put forward from both network application and handling mechanism perspectives. A TCoD network prototype system based on Asynchronous Transfer Mode/Multi-Protocol Label Switching (ATM/MPLS) is introduced and some experiments are performed on it. The prototype system is evaluated and analyzed with the comprehensive evaluation index system. The results show that the index system can be used to judge whether the communication network can meet the application requirements or not,and can provide references for the optimization of the transport policies so as to improve the communication network effectiveness.
文摘The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in academia about the establishment of "weak" and "narrow" versions of PH. Based on the panel data of application for patent of energy conservation and emission reduction(ECER) technology of Chinese city scale during 2008-2014, comprehensive energy price, pollutant emission, etc., mixed regression model and systematic generalized method of moments method were adopted, respectively,to study the impact of market-oriented and command-and-control policy tool on China's ECER technology innovation. The results show that the environmental regulation hindered the technological innovation in the immediate phase; however, it turned out to be positive in the first-lag phase. Hence, the establishment of "weak" PH is time-bounded. The command-and-control policy tool played a more positive role in promoting technological innovation in the first-lag phase than market-oriented policy tool. Therefore, "narrow" PH is not tenable. The reason is that the main participants of China's ECER technology innovation are state-owned companies and public institutions. Regionally speaking, the impact which command-and-control policy tool has on technological innovation at sight was nonsignificant in the eastern, the central, and the western regions of China whilst market-oriented policy tool had a negative effect. And market-oriented policy tool in the central region had strongest negative effect, which would diminish in the eastern region and become weakest in the western region. This was related to regional energy consumption level and the market economic vitality.
文摘Loess Plateau is the most serious region of soil and water loss in China and the world. The sediment carried into the Yellow River amounts to 1.6 billion tons every year. This paper reviews the factors and reasons for erosion in this area, and puts forward a comprehensive controlling policy on the basis of the principles of ecology and practise of Chinese scientists for 40 years. In conformity with the policy, a number of technical measures for controlling soil and water loss are suggested.
基金supported in part by National Key Basic Research Program of China (973 Program) under Grant No.2013CB329603National Natural Science Foundation of China under Grant No.60903191
文摘The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result.
基金This work has been funded by the National Natural Science Foundation of China(No.U1836203)the Shandong Provincial Key Research and Development Program(2019JZZY20127).
文摘Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research Group No.RG-1441-309.
文摘Since COVID-19 was declared as a pandemic in March 2020,the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment.This paper uses a novel Bi-Level Dynamic Optimal Control model(BLDOC)to coordinate control between COVID-19 and unemployment.The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model.The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals,and at the same time minimizing the cost of the containment strategies.We use the modified approximation Karush–Kuhn–Tucker(KKT)conditions with the Hamiltonian function to handle the bi-level dynamic optimal control model.We consider three control variables:The first control variable relates to government measures to curb the COVID-19 pandemic,i.e.,quarantine,social distancing,and personal protection;and the other two control variables relate to government interventions to reduce the unemployment rate,i.e.,employment,making individuals qualified,creating new jobs reviving the economy,reducing taxes.We investigate four different cases to verify the effect of control variables.Our results indicate that rather than focusing exclusively on only one problem,we need a balanced trade-off between controlling each.
基金School Funded Project of COVID-19 of Chongqing Medical University,No.CQMUNCP0204Young Scientists Fund Program of the Education Commission of Chongqing,No.KJQN201900443+2 种基金National Key Research and Development Project of the Ministry of Science and Technology of the People's Republic of China,No.2017YFC0211705Young Scientists Fund Program of the National Natural Science Foundation of China,No.81502826and General Program of the China Postdoctoral Science Foundation,No.2014M562289.
文摘BACKGROUND Coronavirus disease 2019(COVID-19)is an emerging,rapidly evolving disease that spreads through the respiratory system and is highly contagious.In March 2020,the World Health Organization declared the COVID-19 outbreak a pandemic.In China,the pandemic was controlled after 2 mo through effective policies and containment measures.Describing the detailed policies and containment measures used to control the epidemic in Chongqing will provide a reference for the prevention and control of COVID-19 in other areas of the world.AIM To explore the effects of different policies and containment measures on the control of the COVID-19 epidemic in Chongqing.METHODS Epidemiological data on COVID-19 in Chongqing were prospectively collected from January 21 to March 15,2020.The policies and prevention measures implemented by the government during the epidemic period were also collected.Trend analysis was performed to explore the impact of the main policy measures on the effectiveness of the control of COVID-19 in Chongqing.As of March 15,the cumulative incidence of COVID-19 in Chongqing was 1.84/100000(576 cases)and the infection fatality rate was 1.04%(6/576).The spread of COVID-19 was controlled by effective policies that involved establishing a group for directing the COVID-19 epidemic control effort;strengthening guidance and supervision;ensuring the supply of daily necessities and medical supplies and equipment to residents;setting up designated hospitals;implementing legal measures;and enhancing health education.Medical techniques were implemented to improve the recovery rate and control the epidemic.Policies such as“the lockdown of Wuhan”,“initiating a first-level response to major public health emergencies”,and“implementing the closed management of residential communities”significantly curbed the spread of COVID-19.Optimizing the diagnosis process,shortening the diagnosis time,and constructing teams of clinical experts facilitated the provision of“one team of medical experts for each patient”treatment for severe patients,which significantly improved the recovery rate and reduced the infection fatality rate.CONCLUSION The prevention policies and containment measures implemented by the government and medical institutions are highly effective in controlling the spread of the epidemic and increasing the recovery rate of COVID-19 patients.
文摘In the process of economic development, government uses the "visible hand" to achieve macroeconomic regulation and control for "market failure", which has been common knowledge among people after World War II. Comparing policy and means adopted by Chinese and foreign governments in macro regulation and control, we can see that the choice is different in different historical periods and the change of emphasis in macro regulation and control policy and means has the convergence tendency. We can make the following conclusion from research of the change rules of macro regulation and control means in the market economic condition of Chinese and foreign governments: supply-side structural reform in China complies with the basic rules of development of market economy.
基金National Natural Science Foundation of China (Youth Foundation): Study on the Operating Efficiency and Energy Consumption Optimization Methods of the Regional Passenger Transport System (71201006) (Xuesong FENG)
文摘With the rapid development of economy and motorization, the traffic congestion and environmental problems have become more and more serious day by day in Beijing. Therefore, traffic control policies have been gradually adopted by Beijing municipal government since 2008, so as to ease traffic and environmental problems. In this paper, the background and current situation of Beijing to implement traffic control policies are introduced, and also this measure is analyzed and evaluated from traffic effect, environmental effect, motor vehicle development, urban road development, public transport development, and balance between supply and demand, etc. Finally, related conclusions are drawn up as follows: an induced traffic volume will be generated by traffic control policies, and the effect of the traffic control will be erased by the natural growth rate of motor vehicles in three years; public traffic service should be improved for better making traffic control policies; the traffic congestion and environmental problems are alleviated by traffic control policies in the short term, but can't be fundamentally solved in the long run; traffic control policies should cooperate with other traffic demand management policies for reducing demands, and traffic condition should be optimized in both time and space, so that the traffic congestion and environmental problems will be fundamentally solved.
基金supported by the NSF of China(11931018, 12271274)the Tianjin Natural Science Foundation (19JCYBJC30400)。
文摘In this paper, we consider the optimal risk sharing problem between two parties in the insurance business: the insurer and the insured. The risk is allocated between the insurer and the insured by setting a deductible and coverage in the insurance contract. We obtain the optimal deductible and coverage by considering the expected product of the two parties' utilities of terminal wealth according to stochastic optimal control theory. An equilibrium policy is also derived for when there are both a deductible and coverage;this is done by modelling the problem as a stochastic game in a continuous-time framework. A numerical example is provided to illustrate the results of the paper.
基金supported by National Key R&D Program of China (2017YFB0802900)NUPTSF (No. NY219004)
文摘Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely used in distributed environment as a declaratively fine-grained,attribute-based access control policy language,but the policy integration of XACML lacks formal description and theory foundation.Multicloud Access Control Policy Integration Framework(MACPIF)is proposed in the paper,which consists of Attribute-based Policy Evaluation Model(ABPEM),Four-value Logic with Completeness(FLC)and Four-value Logic based Policy Integration Operators(FLPIOs).ABPEM evaluates access control policy and extends XACML decision to four-value.According to policy decision set and policy integration characteristics,we construct FLC and define FLPIOs including Intersection,Union,Difference,Implication and Equivalence.We prove that MACPIF can achieve policy monotonicity,functional completeness,canonical suitability and canonical completeness.Analysis results show that this framework can meet the requirements of policy integration in Multicloud.
文摘Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices.The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block encryption and BLAKE hashing technique.An improved Pairing-Free-Ciphertext policy Attribute-based encryption algorithm has been developed to overcome the aforementioned challenges.Further,a comparative study has been performed between the proposed scheme and the different encryption algorithms.It is found that the proposed scheme scores well over the already existing schemes.The scheme is evaluated in terms of execution time and communication overhead.The robustness of the proposed scheme is also analyzed from the perspective of several security goals.