期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Application of Specialized Group Management in the Quality Control of Perioperative Nursing 被引量:2
1
作者 Cong Fu Xuefei Li +4 位作者 Li Wang Yuanyuan Jiang Xinrong Qi Chen Ding Shanshan Tang 《Journal of Clinical and Nursing Research》 2024年第2期70-75,共6页
Objective:To explore the role of specialized group management in the quality control of perioperative nursing.Methods:45 surgical nurses from our hospital were selected as the research subjects.Traditional operating r... Objective:To explore the role of specialized group management in the quality control of perioperative nursing.Methods:45 surgical nurses from our hospital were selected as the research subjects.Traditional operating room management was adopted from July 2019 to June 2020,and specialized group management was adopted from July 2020 to June 2021.The surgeon’s satisfaction,surgical nurses’core professional competence,and surgical patients’satisfaction were obtained through surveys and the results were analyzed.Results:Surgeon satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Besides,surgical nurses’core professional competency scores before the implementation of specialized group management were significantly lower than after its implementation(P<0.05).Lastly,surgical patients’satisfaction before the implementation of specialized group management was significantly lower than after its implementation(P<0.05).Conclusion:Specialized group management helps to improve the quality of perioperative care and should be applied in clinical practice. 展开更多
关键词 Specialized group management Operating room Quality of care CONTROL
下载PDF
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
2
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
3
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
EBS-Based Collusion Resistant Group Key Management Using Attribute-Based Enc ryption 被引量:1
4
作者 Chen Yanli Yang Geng 《China Communications》 SCIE CSCD 2012年第1期92-101,共10页
The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which ... The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of evicted members. A novel EBS-based collusion resistant group management scheme utilizing the construction of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is proposed. The new scheme satisfies the desired security properties, such as forward secrecy, backward secrecy and collusion secrecy. Compared with existing EBS-based key rmnagement scheme, the new scheme can resolve EBS collusion problem completely. Even all evicted members work together, and share their individual piece of information, they could not access to the new group key. In addition, our scheme is more efficient in terms of conmnication and computation overhead when the group size is large. It can be well controlled even in the case of large-scale application scenarios. 展开更多
关键词 group key management exclusion basis systems attribute-based encryption collusionres is tant
下载PDF
Component-Based Software Developing Method for Group Companies Management Information System 被引量:1
5
作者 WANG Xiangzong CHEN Ying LIU Zengliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期37-44,共8页
Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". ... Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization. 展开更多
关键词 management information system for group companies the "assemblage" on the basis of component business component
下载PDF
A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group
6
作者 Wei Song Hua Zou +1 位作者 Haowen Liu Jun Chen 《China Communications》 SCIE CSCD 2016年第6期205-216,共12页
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i... Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme. 展开更多
关键词 proxy re-encryption group key management bilinear map encrypted cloud storage
下载PDF
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:3
7
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo Haitham Cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
下载PDF
The Use of Group Work in ESL Classrooms- Discourse Features and Implications 被引量:1
8
作者 郭奕奕 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期152-157,共6页
Group work has many advantages from language acquisition point of view. However, some teachers are unwilling to introduce group work in their own classroom because group work is very difficult to manage. The author of... Group work has many advantages from language acquisition point of view. However, some teachers are unwilling to introduce group work in their own classroom because group work is very difficult to manage. The author of this essay explores the discourse features of successful and unsuccessful group work using discourse analysis in the hope that the results of this language classroom research can help language teachers gain some insight into the use of group work and make more informed decisions about group work management. 展开更多
关键词 group work discourse features group work management
下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
9
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 Multicast security group communication group key management Access control Secret key tree
下载PDF
HUFFMAN-BASED GROUP KEY ESTABLISHMENT SCHEME WITH LOCATION-AWARE
10
作者 Gu Xiaozhuo Yang Jianzu Lan Julong 《Journal of Electronics(China)》 2009年第2期237-243,共7页
Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-... Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme. 展开更多
关键词 Secure group communication Contributory group key management group key estab-lishment
下载PDF
Zheng Weifeng, General Manager of Chengshan Group in Shandong
11
作者 Xi Zhenkang 《China's Foreign Trade》 1995年第11期30-31,共2页
The tyre industry is one of the industries with the longest history in modern industry. It embodies a country’s economic and technical power. The United States, Germany, Italy and France are not rubber producers. How... The tyre industry is one of the industries with the longest history in modern industry. It embodies a country’s economic and technical power. The United States, Germany, Italy and France are not rubber producers. However, they had their vehicles equipped with air tyres 展开更多
关键词 General Manager of Chengshan group in Shandong Zheng Weifeng THAN
下载PDF
Making Delicious Chinese Food Throughout the World──A Brief Introduction of Mr. Jiang Junxian, General Manager of Quanjude Group Co., Ltd.
12
《China's Foreign Trade》 2000年第7期14-14,共1页
关键词 Making Delicious Chinese Food Throughout the World General Manager of Quanjude group Co A Brief Introduction of Mr Jiang Junxian
下载PDF
The Development Strategy of East Hope Group's Entry into the Aluminum Industry
13
作者 Wenqing Su 《Chinese Business Review》 2005年第7期1-10,共10页
As a large private company starting from feed-processing industry, the East Hope Group has entered the aluminum industry. During the period of less than four years, it has completed two big electrolyticaluminum smelte... As a large private company starting from feed-processing industry, the East Hope Group has entered the aluminum industry. During the period of less than four years, it has completed two big electrolyticaluminum smelters and started the construction of a project of oxide of alumina. With its rapid speed, advanced technology and equipment, and high efficiency, the company has created a miracle in aluminum industry. From the viewpoint of strategic management, the author analyzes the strategic thinking of its entry into the aluminum industry; the strategic measures to build the company into the most competitive enterprise in this industry, and how to maintain a sustainable competitive advantage. Meanwhile, the paper plays an important reference role for the analysis of the private economy, and the enterprises with diversified thinking and those wishing to expand aggressively. 展开更多
关键词 East Hope group electrolytic-aluminum competitive advantage development strategy strategy management
下载PDF
STANDING FIRM IN CHINA'S AUTO INDUSTRY——An Interview with Huang Xiaoping,General Manager of the Yuejin Auto Group Company
14
作者 Liu Ningsheng Li Yulong 《China's Foreign Trade》 1996年第7期21-21,共1页
One day in April,our reporters visitedthis national super-large enterprise.Mr Huang Xiaoping,the generalmanager,briefed us on the company’s brilliantpast and bright future. The Yuejin Auto Group Company isfamed all o... One day in April,our reporters visitedthis national super-large enterprise.Mr Huang Xiaoping,the generalmanager,briefed us on the company’s brilliantpast and bright future. The Yuejin Auto Group Company isfamed all over the world for producing YuejinBrand automobiles.In 1958,the firstgeneration of Yuejin Brand automobiles cameout,and China has since had its first 展开更多
关键词 AUTO STANDING FIRM IN CHINA’S AUTO INDUSTRY An Interview with Huang Xiaoping General Manager of the Yuejin Auto group Company
下载PDF
A Phoenix Reborn An Interview with Zhong Shan, Chairman of the Board and General Manager of the Zhejiang Zhongda Group Holding Co Ltd
15
作者 our staff reporter Jiang Zhihui 《中国经贸画报》 1998年第1期93-94,共2页
After series of reforms including the introduction of the shareholding system, re-organization of capital, expansion of business fields and scale through cooperation or merge with other enterprises,Zhongda Group has n... After series of reforms including the introduction of the shareholding system, re-organization of capital, expansion of business fields and scale through cooperation or merge with other enterprises,Zhongda Group has now become a comprehensive enterprise group integrating import and export, foreign and domestic trade, ?and industry and serviceS.In the past five years stan- 展开更多
关键词 CO In A Phoenix Reborn An Interview with Zhong Shan Chairman of the Board and General Manager of the Zhejiang Zhongda group Holding Co Ltd
下载PDF
Leader of "the Great Wall"──Chairman and General Manager of the Sinopec Great Wall Lubricant Group Co.,Ltd.Sun Yushuang
16
《China's Foreign Trade》 2000年第10期14-15,共2页
关键词 Leader of the Great Wall Ltd.Sun Yushuang Chairman and General Manager of the Sinopec Great Wall Lubricant group Co
下载PDF
SPHERE: a scalable multicast framework in overlay networks
17
作者 刘云 Shen Bo Zhang Hongke 《High Technology Letters》 EI CAS 2006年第1期1-5,共5页
This paper presents Sphere, a scalable multicast framework in overlay network. Sphere is a highly efficient, serf-organizing and robust multicast protocol overlayed on the Internet. The main contrihutions of this pape... This paper presents Sphere, a scalable multicast framework in overlay network. Sphere is a highly efficient, serf-organizing and robust multicast protocol overlayed on the Internet. The main contrihutions of this paper are twofold. First, Sphere organizes the control topology of overlay network in two directions: horizontal and vertical. The horizontal meshes are used to locate and organize hosts in tracks, and the vertical meshes are. used to manage the data paths between tracks. Second, Sphere balances stress and stretch of the overlay network by assigning hosts into different tracks and clusters. This structure distributes stress on the muhicast trees uniformly, and meantime makes path stretch as small as possible. Simulations results show that Sphere can support multicast with large group size and has good performance on organizing meshes and building data delivery trees. 展开更多
关键词 MULTICAST overlay networks group management SELF-ORGANIZATION
下载PDF
Expert group syndrome at high altitude
18
作者 Jean-Paul Richalet Marie-Anne Magnan +1 位作者 Alice Gavet Pierre Lafère 《Sports Medicine and Health Science》 2022年第3期215-218,共4页
During a training session for the university diploma of Mountain medicine delivered by University Sorbonne Paris Nord for medical doctors,one of the participants developed signs of maladaptation to high altitude at 36... During a training session for the university diploma of Mountain medicine delivered by University Sorbonne Paris Nord for medical doctors,one of the participants developed signs of maladaptation to high altitude at 3600 m,the severity of which was incorrectly interpreted.Information was sparingly given by the patient(an anesthetist)to several of his colleagues and no one was in charge to collect clinical data,take a history,and provide appropriate treatment.The combination of the absence of designation of a supervising doctor and the difficulty of communicating with the patient led to a lack of coordinated management and to an evolution of the symptoms towards severe acute mountain sickness.Fortunately,the very rapid management of the patient and a rapid helicopter evacuation,as soon as the symptoms worsened towards the onset of a suspected high altitude cerebral and/or pulmonary edema,allowed rapid resolution without sequelae.Environmental,medical,psychological,and managerial factors led to this Expert Group Syndrome. 展开更多
关键词 Acute mountain sickness High altitude cerebral edema PSYCHOLOGY group management
原文传递
Minimum Exact Cover Problem of Group Key Distribution 被引量:2
19
作者 FU Xiong1,2, XU Shouzhi3 1. School of Law ,Wuhan University, Wuhan 430072, Hubei, China 2. Department of Technology, Guangzhou Luogang District People’s Court, Guangzhou 510730, Guangdong, China 3. College of Electronic Engineering and Information Technology, China Three Gorges University, Yichang 443002, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2009年第2期137-142,共6页
Secure group communications are restrained by the number of the group size, number of changes and their distribution, all existing works do not meet the commands of applications with large group size and high dynamic ... Secure group communications are restrained by the number of the group size, number of changes and their distribution, all existing works do not meet the commands of applications with large group size and high dynamic members. In this paper, minimum exact cover problem for group key distribution (GMECP) is presented, and a heuristic solution is testified. Then an algorithm of batch rekeying with renewing cost tending to zero is illustrated, which can process any large number of change requests with best security guaranteed. Efficiency analysis and simulation test show that the achievement can improve the efficiency of any tree-based group key management. 展开更多
关键词 minimum exact cover problem group key distribution secure multicast group key management
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部