期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
A Corpus-Based Analytical Study on Military and Security Developments Involving People's Republic of China 被引量:2
1
作者 MEI Zhao-yang YANG Min 《Sino-US English Teaching》 2015年第7期510-518,共9页
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ... This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war. 展开更多
关键词 corpus Military Power of the People's Republic of China and Military security developments Involving People's Republic of China Sino-America relation
下载PDF
Some Observations on the 2016 International Security Developments
2
作者 Jian Hong 《Peace》 2017年第1期60-65,共6页
The continuous unrest in Western Asia and Northern Africa and other regions is bringing about a changing global security environment, and the international security situation presents new developments different from t... The continuous unrest in Western Asia and Northern Africa and other regions is bringing about a changing global security environment, and the international security situation presents new developments different from the past with more diversified and complex features. To understand the new international security situation highlighted by the complex conflicts and its future trend, particular attention should be given to the suspended coordination and sustained differences within the international community. With the deepening development of economic globalization and world multi-polarization structure, China has ushered in a number of major development opportunities, but also faced with a complex and severe international security situation. 展开更多
关键词 of is WEST or ASIA MORE with in Some Observations on the 2016 International security developments on
原文传递
Development of Hybrid Rice to Ensure Food Security 被引量:41
3
作者 YUAN Long-ping 《Rice science》 SCIE 2014年第1期1-2,共2页
Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, an... Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, and reducing poverty. Given the vast population and limited per capita cultivated land in China, meeting food demands by increasing the yield per unit area with the aid of advanced sciences and technologies would be the only option. Several alternative measures for increasing crop yield, such as building water conservancy facilities, increasing fertilizer application, improving soil texture, forming interrelated cultivation techniques, more effective controlling of pests and diseases, and using of elite varieties, have been undertaken. Among these alternative measures, adopting elite varieties, particularly popularizing super hybrid rice, proves to be the most economical and effective option. 展开更多
关键词 THAN MORE area development of Hybrid Rice to Ensure Food security
下载PDF
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development 被引量:1
4
作者 Mamoona Humayun NZ Jhanjhi +1 位作者 Maram Fahhad Almufareh Muhammad Ibrahim Khalil 《Computers, Materials & Continua》 SCIE EI 2022年第6期5039-5059,共21页
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T... Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications. 展开更多
关键词 security secure software development software development life cycle(SDLC) CONFIDENTIALITY INTEGRITY AVAILABILITY
下载PDF
Coalition Emergency Response System, City Security and City Sustainable Development 被引量:1
5
作者 Weiliang Zeng Yanheng Zhu 《Chinese Business Review》 2005年第1期79-81,共3页
The relations among the establishment of Coalition Emergency Response System (CERS), city security and city sustainable development are analyzed in the article. According to the relation analysis, it is concluded th... The relations among the establishment of Coalition Emergency Response System (CERS), city security and city sustainable development are analyzed in the article. According to the relation analysis, it is concluded that cities should build up their CERS to deal with the thread of damage in China. The recommendations about the establishment of the system are also provided. 展开更多
关键词 coalition emergency response system city security city sustainable development
下载PDF
Balancing Development and Security in the Context of Containment and Pressure by the United States
6
作者 Zhang Wenzong 《Contemporary International Relations》 2022年第5期33-53,共21页
The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China ... The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term. 展开更多
关键词 United States containment holistic approach to national security balancing development and security
下载PDF
Ensuring Both Development and Security: Evolutionary Logic and Contemporary Values
7
作者 Huang Dahui Hu Qing 《Contemporary International Relations》 2022年第6期24-51,共28页
China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to... China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics. 展开更多
关键词 ensuring both development and security holistic approach to national security path of national security with Chinese characteristics
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
8
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 US in IS on WILL that RECENT developmentS OF US ASIA-PACIFIC security STRATEGY AND CHINA’S COUNTERMEASURES ROK of
下载PDF
日本的全球安全发展问题探析
9
作者 刘云 田正 《Contemporary International Relations》 2024年第2期56-78,共23页
Against the backdrop of the current international situation,which remains complex and fast-changing, Japan dances to America's tune, attempting to rebuild its industrial power featuring “strategic indispensabili... Against the backdrop of the current international situation,which remains complex and fast-changing, Japan dances to America's tune, attempting to rebuild its industrial power featuring “strategic indispensability,” establish resource power based on the independent and stable supply of strategic materials, and construct normative power to influence or even dominate the international economic order. Such an approach closely echoes the current three strategic preferences of Japan:re-emergence as a global power has been Japan's long-held political aspiration, conservatism defines the country's way of thinking, and liberalization and openness reflect realistic needs. Japan relies excessively on conservative thinking, overemphasizes “small security,” and stresses “strategic autonomy.” However, the greater importance it places on security, the less secure it will become. Similarly, decoupling and supply chain disruption will only retard the development of Japan, pushing the country into the trap of Braess' s Paradox. The rise of the East, the decline of the West, and the advent of the Asian century are historical trends.Japan cannot achieve secure development in isolation from Asia and the East, much less from China. 展开更多
关键词 industrial power JAPAN normative power resource power secure development
下载PDF
2023年各国谋安全促发展纵横
10
作者 陆忠伟 《Contemporary International Relations》 2024年第2期4-17,共14页
2023 will be remembered as a critical juncture in the third decade of the 21st century.Significant changes have been witnessed in the international landscape,underpinned by the law of history that great powers rise an... 2023 will be remembered as a critical juncture in the third decade of the 21st century.Significant changes have been witnessed in the international landscape,underpinned by the law of history that great powers rise and inevitably fall.It could be deemed a year of coup d'état for Africa,a year of conflict for Eastern Europe,a year of crisis for the Middle East,and a year of diplomacy for major powers.Countries around the globe are concerned about how the world and times will evolve as they pursue their security and development.As a responsible major country,China has proposed its solutions for enhancing security,development,and civilizations worldwide.It applies an approach that removes barriers and increases connectivity,turns shocks into driving forces,accumulates experience from setbacks,and arouses confidence in today's unsettled world.While promoting world peace and development,China also needs to pay close heed to the changes that are taking place.Only by identifying the crux of its problems and stopping the spread of risks can China ensure a dynamic equilibrium between security and development. 展开更多
关键词 international landscape rise and fall of great powers security and development 2023
下载PDF
Financial Globalization and Financial Security for Developing Countries
11
《International Understanding》 2001年第3期20-25,共6页
关键词 security Financial Globalization and Financial security for Developing Countries RATE
下载PDF
PetroChina Focusing on Oil and Gas Exploration to Secure Sustainable Development
12
《China Oil & Gas》 CAS 2000年第4期8-10,共3页
关键词 PetroChina Focusing on Oil and Gas Exploration to Secure Sustainable development
下载PDF
Historic Achievements in Developing Human Resources and Social Security
13
作者 YIN WEIMIN 《The Journal of Human Rights》 2009年第3期2-4,共3页
Guided by the state policy of reform and opening to the outside world, the Chinese Government has, by dint of hard work over the past three decades, by and large accomplished the task of building up a human resources ... Guided by the state policy of reform and opening to the outside world, the Chinese Government has, by dint of hard work over the past three decades, by and large accomplished the task of building up a human resources and social security system. Good enough to serve China's goal of developing a socialist market economy, this system has contributed to the national endeavor to ensure and improve people's livelihood and to safeguard the stability of the reform-and-opening undertakings. 展开更多
关键词 OVER Historic Achievements in Developing Human Resources and Social security
下载PDF
Mobile Software Assurance Informed through Knowledge Graph Construction: The OWASP Threat of Insecure Data Storage
14
作者 Suzanna Schmeelk Lixin Tao 《Journal of Computer Science Research》 2020年第2期17-29,共13页
Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologi... Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data. 展开更多
关键词 CYBERsecurity Secure software development Penetration testing Risk assessment
下载PDF
Developing Chinese Securities Market
15
作者 Zong Shu 《China's Foreign Trade》 1997年第7期36-36,共1页
The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financi... The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financial pressure. During the five years of 1981-1985, our country accumulated negotiable securities of RMB24.2 billion, mainly national bonds, accOunting for 97.9 percent of the total. Since 1986, the securities market has been developing towards diversification, along with increasing varieties. From 1986 to 1990, 展开更多
关键词 OVER Developing Chinese Securities Market
下载PDF
The Value Choice for Legal Regulation of Financial Risks in Shadow Banking
16
作者 Liao Jingyi 《Contemporary Social Sciences》 2021年第5期55-67,共13页
It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is e... It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control. 展开更多
关键词 shadow banking financial risk development of security value choice
下载PDF
The study of China's social insurance funds to implement the "nominal account" Feasibility
17
作者 Zhang Wenqin 《International English Education Research》 2015年第5期14-17,共4页
The current China's social security fund adopts the operation mode of "combination of social pooling and individual accounts".With the increase of the social security fund, the settlement of these problems is very ... The current China's social security fund adopts the operation mode of "combination of social pooling and individual accounts".With the increase of the social security fund, the settlement of these problems is very important. In this paper, the analysis based on the problems of China's basic old-age insurance in the current system mode operation, the "nominal account system characteristics and operation of overseas advantages and disadvantages on were described in detail, and points out that the" nominal account "made for a new old-age insurance system mode is conducive to resolving the problems existing in the operation of social security fund, so as to promote the foundation of sustainable development. 展开更多
关键词 social security fund "nominal account" sustainable development
下载PDF
Abstract security patterns and the design of secure systems
18
作者 Eduardo B.Fernandez Nobukazu Yoshioka +1 位作者 Hironori Washizaki Joseph Yoder 《Cybersecurity》 EI CSCD 2022年第3期1-17,共17页
During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be ba... During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design. 展开更多
关键词 security patterns Secure software development security requirements Secure software architecture loT systems design
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部