In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k...In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better.展开更多
<strong>Aim:</strong> The aim of this study was to illuminate registered nurses’ (RNs) perceptions of Trust-Based Public Management (TBPM) in Swedish health care. Design: This study follows a phenomenogra...<strong>Aim:</strong> The aim of this study was to illuminate registered nurses’ (RNs) perceptions of Trust-Based Public Management (TBPM) in Swedish health care. Design: This study follows a phenomenografic approach guided by Ference Marton’s philosophy. <strong>Methods:</strong> Semi-structured interviews were used to identify variations in RNs’ perceptions of TBPM. Between February and April 2019, 24 RNs from five Swedish public healthcare departments participated in the study. <strong>Results: </strong>The results show that none of the participants had previously heard about the work of the Swedish Delegation for TBPM. The study revealed perceptions those politicians and managers were absent from the workplace, that power had been displaced to HR, and that perceptions of trust in the leadership and of working to guidelines varied. Perceptions varied between RNs employed by the municipalities and by the hospitals concerning administration, the time allotted for work, cooperation, and education.展开更多
Public benefit trust is of great significance to the development of social public welfare, and the cy-pres doctrine as a special principle of public benefit trust, plays an important role in protecting the continuatio...Public benefit trust is of great significance to the development of social public welfare, and the cy-pres doctrine as a special principle of public benefit trust, plays an important role in protecting the continuation of public benefit trust, and the realization and reasonable use of high-efficiency trust properties. In this paper, therefore, the origin, establishment, and development trend of the approximation principle as well as its current legislative situation in China are studied, and also its applicability of the Cy-Pres doctrine in China's public benefit trust is briefly evaluated, so as to further deepen the understanding of the Cy-Pres doctrine and develop the public benefit trust undertakings in China.展开更多
Hong Kong has a long history with its high efficiency and clean and self-disciplined government.Within the past over 20 years,different social development trend has occurred in Hong Kong.The article observed the relat...Hong Kong has a long history with its high efficiency and clean and self-disciplined government.Within the past over 20 years,different social development trend has occurred in Hong Kong.The article observed the relationship between political trust from residence and public service efficiency of government in Hong Kong from 1992 to 2015 and found that the value of public service efficiency has a significant effect on political trust in Hong Kong government,the higher the efficiency of public services,the higher the political trust.The author tried to find the path for the Hong Kong government to improve its public service quality and efficiency after testifying the positive correlation between public service efficiency and residential political trust with empirical analysis.展开更多
In LEO(Low Earth Orbit)satellite communication systems,the satellite network is made up of a large number of satellites,the dynamically changing network environment affects the results of distributed computing.In orde...In LEO(Low Earth Orbit)satellite communication systems,the satellite network is made up of a large number of satellites,the dynamically changing network environment affects the results of distributed computing.In order to improve the fault tolerance rate,a novel public blockchain consensus mechanism that applies a distributed computing architecture in a public network is proposed.Redundant calculation of blockchain ensures the credibility of the results;and the transactions with calculation results of a task are stored distributed in sequence in Directed Acyclic Graphs(DAG).The transactions issued by nodes are connected to form a net.The net can quickly provide node reputation evaluation that does not rely on third parties.Simulations show that our proposed blockchain has the following advantages:1.The task processing speed of the blockchain can be close to that of the fastest node in the entire blockchain;2.When the tasks’arrival time intervals and demanded working nodes(WNs)meet certain conditions,the network can tolerate more than 50%of malicious devices;3.No matter the number of nodes in the blockchain is increased or reduced,the network can keep robustness by adjusting the task’s arrival time interval and demanded WNs.展开更多
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident...Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.展开更多
Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evalua...Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately.展开更多
The Internet reconstructs the order of information dissemination and power relations during a public crisis and facilitates the redistribution of discourse power. Therefore, from a micro perspective, it further compli...The Internet reconstructs the order of information dissemination and power relations during a public crisis and facilitates the redistribution of discourse power. Therefore, from a micro perspective, it further complicates a specific crisis;while from a macro perspective, it intensifies the uncertainty of social risks. In the context of a public crisis, through the redistribution of discourse power, the Internet promotes competitions among a diversity of opinions and disintegrates the traditional mechanism of opinion expression, the mechanism of social trust and the legitimate mechanism of decision making and power exercising. In the meantime, the Internet also creates space for social actions. This space, integrating the virtual space with the real world, enables the public to"upgrade"from onlookers and expressers to active movers. Dialogue among plural subjects in the society should be deemed a basic notion and the approach to public crisis management in the era of the Internet should renew the discourse order, reconstruct the mechanisms of trust and legitimacy, and cultivate a sense of identity and community in a pluralist context.展开更多
Purpose: This paper aims to assess if the extent of openness and the coverage of data sets released by European governments have a significant impact on citizen trust in public institutions.Design/methodology/approach...Purpose: This paper aims to assess if the extent of openness and the coverage of data sets released by European governments have a significant impact on citizen trust in public institutions.Design/methodology/approach: Data for openness and coverage have been collected from the Open Data Inventory 2018(ODIN), by Open Data Watch;institutional trust is built up as a formative construct based on the European Social Survey(ESS), Round 9. The relations between the open government data features and trust have been tested on the basis of structural equation modelling(SEM).Findings: The paper reveals that as European governments improve data openness, disaggregation, and time coverage, people tend to trust them more. However, the size of the effect is still small and, comparatively, data coverage effect on citizens' confidence is more than twice than the impact of openness.Research limitations: This paper analyzes the causal effect of Open Government Data(OGD) features captured in a certain moment of time. In upcoming years, as OGD is implemented and a more consistent effect on people is expected, time series analysis will provide with a deeper insight.Practical implications: Public officers should continue working in the development of a technological framework that contributes to make OGD truly open. They should improve the added value of the increasing amount of open data currently available in order to boost internal and external innovations valuable both for public agencies and citizens.Originality/value: In a field of knowledge with little quantitative empirical evidence, this paper provides updated support for the positive effect of OGD strategies and it also points out areas of improvement in terms of the value that citizens can get from OGD coverage and openness.展开更多
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi...By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.展开更多
基金Supported by the National Natural Science Funda-tion of China (60403027)
文摘In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better.
文摘<strong>Aim:</strong> The aim of this study was to illuminate registered nurses’ (RNs) perceptions of Trust-Based Public Management (TBPM) in Swedish health care. Design: This study follows a phenomenografic approach guided by Ference Marton’s philosophy. <strong>Methods:</strong> Semi-structured interviews were used to identify variations in RNs’ perceptions of TBPM. Between February and April 2019, 24 RNs from five Swedish public healthcare departments participated in the study. <strong>Results: </strong>The results show that none of the participants had previously heard about the work of the Swedish Delegation for TBPM. The study revealed perceptions those politicians and managers were absent from the workplace, that power had been displaced to HR, and that perceptions of trust in the leadership and of working to guidelines varied. Perceptions varied between RNs employed by the municipalities and by the hospitals concerning administration, the time allotted for work, cooperation, and education.
文摘Public benefit trust is of great significance to the development of social public welfare, and the cy-pres doctrine as a special principle of public benefit trust, plays an important role in protecting the continuation of public benefit trust, and the realization and reasonable use of high-efficiency trust properties. In this paper, therefore, the origin, establishment, and development trend of the approximation principle as well as its current legislative situation in China are studied, and also its applicability of the Cy-Pres doctrine in China's public benefit trust is briefly evaluated, so as to further deepen the understanding of the Cy-Pres doctrine and develop the public benefit trust undertakings in China.
基金Our article is a stage achievement of the Project of the 13th Five-year Plan of Education Science of Guangdong Province:“Path to Improve Governance Capacity of Pilot Zone of Shenzhen”(2020GXJK031)the Project of Philosophy&Social of Zhuhai City:“An Investigation on National Identity of University Students from Hong Kong and Macao in Zhuhai”(2019YC052).We appreciate the support from the projects.
文摘Hong Kong has a long history with its high efficiency and clean and self-disciplined government.Within the past over 20 years,different social development trend has occurred in Hong Kong.The article observed the relationship between political trust from residence and public service efficiency of government in Hong Kong from 1992 to 2015 and found that the value of public service efficiency has a significant effect on political trust in Hong Kong government,the higher the efficiency of public services,the higher the political trust.The author tried to find the path for the Hong Kong government to improve its public service quality and efficiency after testifying the positive correlation between public service efficiency and residential political trust with empirical analysis.
基金funded in part by the National Natural Science Foundation of China (Grant no. 61772352, 62172061, 61871422)National Key Research and Development Project (Grants nos. 2020YFB1711800 and 2020YFB1707900)+2 种基金the Science and Technology Project of Sichuan Province (Grants no. 2021YFG0152, 2021YFG0025, 2020YFG0479, 2020YFG0322, 2020GFW035, 2020GFW033, 2020YFH0071)the R&D Project of Chengdu City (Grant no. 2019-YF05-01790-GX)the Central Universities of Southwest Minzu University (Grants no. ZYN2022032)
文摘In LEO(Low Earth Orbit)satellite communication systems,the satellite network is made up of a large number of satellites,the dynamically changing network environment affects the results of distributed computing.In order to improve the fault tolerance rate,a novel public blockchain consensus mechanism that applies a distributed computing architecture in a public network is proposed.Redundant calculation of blockchain ensures the credibility of the results;and the transactions with calculation results of a task are stored distributed in sequence in Directed Acyclic Graphs(DAG).The transactions issued by nodes are connected to form a net.The net can quickly provide node reputation evaluation that does not rely on third parties.Simulations show that our proposed blockchain has the following advantages:1.The task processing speed of the blockchain can be close to that of the fastest node in the entire blockchain;2.When the tasks’arrival time intervals and demanded working nodes(WNs)meet certain conditions,the network can tolerate more than 50%of malicious devices;3.No matter the number of nodes in the blockchain is increased or reduced,the network can keep robustness by adjusting the task’s arrival time interval and demanded WNs.
文摘Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.
基金supported by Major Project of The National Social Science Fund of China[Grant number.19ZDA149]the Guanghua Talent Project of Southwestern University of Finance and Economics.
文摘Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately.
基金a staged research result of “Studies in Rational Expression amid Public Opinions in the Age of New Media(15BXW057)a research program sponsored by the National Social Science Foundation
文摘The Internet reconstructs the order of information dissemination and power relations during a public crisis and facilitates the redistribution of discourse power. Therefore, from a micro perspective, it further complicates a specific crisis;while from a macro perspective, it intensifies the uncertainty of social risks. In the context of a public crisis, through the redistribution of discourse power, the Internet promotes competitions among a diversity of opinions and disintegrates the traditional mechanism of opinion expression, the mechanism of social trust and the legitimate mechanism of decision making and power exercising. In the meantime, the Internet also creates space for social actions. This space, integrating the virtual space with the real world, enables the public to"upgrade"from onlookers and expressers to active movers. Dialogue among plural subjects in the society should be deemed a basic notion and the approach to public crisis management in the era of the Internet should renew the discourse order, reconstruct the mechanisms of trust and legitimacy, and cultivate a sense of identity and community in a pluralist context.
文摘Purpose: This paper aims to assess if the extent of openness and the coverage of data sets released by European governments have a significant impact on citizen trust in public institutions.Design/methodology/approach: Data for openness and coverage have been collected from the Open Data Inventory 2018(ODIN), by Open Data Watch;institutional trust is built up as a formative construct based on the European Social Survey(ESS), Round 9. The relations between the open government data features and trust have been tested on the basis of structural equation modelling(SEM).Findings: The paper reveals that as European governments improve data openness, disaggregation, and time coverage, people tend to trust them more. However, the size of the effect is still small and, comparatively, data coverage effect on citizens' confidence is more than twice than the impact of openness.Research limitations: This paper analyzes the causal effect of Open Government Data(OGD) features captured in a certain moment of time. In upcoming years, as OGD is implemented and a more consistent effect on people is expected, time series analysis will provide with a deeper insight.Practical implications: Public officers should continue working in the development of a technological framework that contributes to make OGD truly open. They should improve the added value of the increasing amount of open data currently available in order to boost internal and external innovations valuable both for public agencies and citizens.Originality/value: In a field of knowledge with little quantitative empirical evidence, this paper provides updated support for the positive effect of OGD strategies and it also points out areas of improvement in terms of the value that citizens can get from OGD coverage and openness.
基金supported by the 863 Program under Grant No. 2008AA04A107
文摘By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.