This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
The continuous unrest in Western Asia and Northern Africa and other regions is bringing about a changing global security environment, and the international security situation presents new developments different from t...The continuous unrest in Western Asia and Northern Africa and other regions is bringing about a changing global security environment, and the international security situation presents new developments different from the past with more diversified and complex features. To understand the new international security situation highlighted by the complex conflicts and its future trend, particular attention should be given to the suspended coordination and sustained differences within the international community. With the deepening development of economic globalization and world multi-polarization structure, China has ushered in a number of major development opportunities, but also faced with a complex and severe international security situation.展开更多
Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, an...Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, and reducing poverty. Given the vast population and limited per capita cultivated land in China, meeting food demands by increasing the yield per unit area with the aid of advanced sciences and technologies would be the only option. Several alternative measures for increasing crop yield, such as building water conservancy facilities, increasing fertilizer application, improving soil texture, forming interrelated cultivation techniques, more effective controlling of pests and diseases, and using of elite varieties, have been undertaken. Among these alternative measures, adopting elite varieties, particularly popularizing super hybrid rice, proves to be the most economical and effective option.展开更多
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T...Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.展开更多
The relations among the establishment of Coalition Emergency Response System (CERS), city security and city sustainable development are analyzed in the article. According to the relation analysis, it is concluded th...The relations among the establishment of Coalition Emergency Response System (CERS), city security and city sustainable development are analyzed in the article. According to the relation analysis, it is concluded that cities should build up their CERS to deal with the thread of damage in China. The recommendations about the establishment of the system are also provided.展开更多
The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China ...The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.展开更多
China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to...China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.展开更多
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi...The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald展开更多
Against the backdrop of the current international situation,which remains complex and fast-changing, Japan dances to America's tune, attempting to rebuild its industrial power featuring “strategic indispensabili...Against the backdrop of the current international situation,which remains complex and fast-changing, Japan dances to America's tune, attempting to rebuild its industrial power featuring “strategic indispensability,” establish resource power based on the independent and stable supply of strategic materials, and construct normative power to influence or even dominate the international economic order. Such an approach closely echoes the current three strategic preferences of Japan:re-emergence as a global power has been Japan's long-held political aspiration, conservatism defines the country's way of thinking, and liberalization and openness reflect realistic needs. Japan relies excessively on conservative thinking, overemphasizes “small security,” and stresses “strategic autonomy.” However, the greater importance it places on security, the less secure it will become. Similarly, decoupling and supply chain disruption will only retard the development of Japan, pushing the country into the trap of Braess' s Paradox. The rise of the East, the decline of the West, and the advent of the Asian century are historical trends.Japan cannot achieve secure development in isolation from Asia and the East, much less from China.展开更多
2023 will be remembered as a critical juncture in the third decade of the 21st century.Significant changes have been witnessed in the international landscape,underpinned by the law of history that great powers rise an...2023 will be remembered as a critical juncture in the third decade of the 21st century.Significant changes have been witnessed in the international landscape,underpinned by the law of history that great powers rise and inevitably fall.It could be deemed a year of coup d'état for Africa,a year of conflict for Eastern Europe,a year of crisis for the Middle East,and a year of diplomacy for major powers.Countries around the globe are concerned about how the world and times will evolve as they pursue their security and development.As a responsible major country,China has proposed its solutions for enhancing security,development,and civilizations worldwide.It applies an approach that removes barriers and increases connectivity,turns shocks into driving forces,accumulates experience from setbacks,and arouses confidence in today's unsettled world.While promoting world peace and development,China also needs to pay close heed to the changes that are taking place.Only by identifying the crux of its problems and stopping the spread of risks can China ensure a dynamic equilibrium between security and development.展开更多
Guided by the state policy of reform and opening to the outside world, the Chinese Government has, by dint of hard work over the past three decades, by and large accomplished the task of building up a human resources ...Guided by the state policy of reform and opening to the outside world, the Chinese Government has, by dint of hard work over the past three decades, by and large accomplished the task of building up a human resources and social security system. Good enough to serve China's goal of developing a socialist market economy, this system has contributed to the national endeavor to ensure and improve people's livelihood and to safeguard the stability of the reform-and-opening undertakings.展开更多
Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologi...Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.展开更多
The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financi...The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financial pressure. During the five years of 1981-1985, our country accumulated negotiable securities of RMB24.2 billion, mainly national bonds, accOunting for 97.9 percent of the total. Since 1986, the securities market has been developing towards diversification, along with increasing varieties. From 1986 to 1990,展开更多
It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is e...It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control.展开更多
The current China's social security fund adopts the operation mode of "combination of social pooling and individual accounts".With the increase of the social security fund, the settlement of these problems is very ...The current China's social security fund adopts the operation mode of "combination of social pooling and individual accounts".With the increase of the social security fund, the settlement of these problems is very important. In this paper, the analysis based on the problems of China's basic old-age insurance in the current system mode operation, the "nominal account system characteristics and operation of overseas advantages and disadvantages on were described in detail, and points out that the" nominal account "made for a new old-age insurance system mode is conducive to resolving the problems existing in the operation of social security fund, so as to promote the foundation of sustainable development.展开更多
During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be ba...During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.展开更多
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
文摘The continuous unrest in Western Asia and Northern Africa and other regions is bringing about a changing global security environment, and the international security situation presents new developments different from the past with more diversified and complex features. To understand the new international security situation highlighted by the complex conflicts and its future trend, particular attention should be given to the suspended coordination and sustained differences within the international community. With the deepening development of economic globalization and world multi-polarization structure, China has ushered in a number of major development opportunities, but also faced with a complex and severe international security situation.
文摘Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, and reducing poverty. Given the vast population and limited per capita cultivated land in China, meeting food demands by increasing the yield per unit area with the aid of advanced sciences and technologies would be the only option. Several alternative measures for increasing crop yield, such as building water conservancy facilities, increasing fertilizer application, improving soil texture, forming interrelated cultivation techniques, more effective controlling of pests and diseases, and using of elite varieties, have been undertaken. Among these alternative measures, adopting elite varieties, particularly popularizing super hybrid rice, proves to be the most economical and effective option.
文摘Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.
文摘The relations among the establishment of Coalition Emergency Response System (CERS), city security and city sustainable development are analyzed in the article. According to the relation analysis, it is concluded that cities should build up their CERS to deal with the thread of damage in China. The recommendations about the establishment of the system are also provided.
文摘The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.
文摘China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.
文摘The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald
基金the phased achievement of a National Social Science Fund project (No.21BGJ057)。
文摘Against the backdrop of the current international situation,which remains complex and fast-changing, Japan dances to America's tune, attempting to rebuild its industrial power featuring “strategic indispensability,” establish resource power based on the independent and stable supply of strategic materials, and construct normative power to influence or even dominate the international economic order. Such an approach closely echoes the current three strategic preferences of Japan:re-emergence as a global power has been Japan's long-held political aspiration, conservatism defines the country's way of thinking, and liberalization and openness reflect realistic needs. Japan relies excessively on conservative thinking, overemphasizes “small security,” and stresses “strategic autonomy.” However, the greater importance it places on security, the less secure it will become. Similarly, decoupling and supply chain disruption will only retard the development of Japan, pushing the country into the trap of Braess' s Paradox. The rise of the East, the decline of the West, and the advent of the Asian century are historical trends.Japan cannot achieve secure development in isolation from Asia and the East, much less from China.
文摘2023 will be remembered as a critical juncture in the third decade of the 21st century.Significant changes have been witnessed in the international landscape,underpinned by the law of history that great powers rise and inevitably fall.It could be deemed a year of coup d'état for Africa,a year of conflict for Eastern Europe,a year of crisis for the Middle East,and a year of diplomacy for major powers.Countries around the globe are concerned about how the world and times will evolve as they pursue their security and development.As a responsible major country,China has proposed its solutions for enhancing security,development,and civilizations worldwide.It applies an approach that removes barriers and increases connectivity,turns shocks into driving forces,accumulates experience from setbacks,and arouses confidence in today's unsettled world.While promoting world peace and development,China also needs to pay close heed to the changes that are taking place.Only by identifying the crux of its problems and stopping the spread of risks can China ensure a dynamic equilibrium between security and development.
文摘Guided by the state policy of reform and opening to the outside world, the Chinese Government has, by dint of hard work over the past three decades, by and large accomplished the task of building up a human resources and social security system. Good enough to serve China's goal of developing a socialist market economy, this system has contributed to the national endeavor to ensure and improve people's livelihood and to safeguard the stability of the reform-and-opening undertakings.
文摘Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.
文摘The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financial pressure. During the five years of 1981-1985, our country accumulated negotiable securities of RMB24.2 billion, mainly national bonds, accOunting for 97.9 percent of the total. Since 1986, the securities market has been developing towards diversification, along with increasing varieties. From 1986 to 1990,
基金This paper is funded by the National Social Science Fund titled“Study on the Legal Issues Concerning the Financial Risks and Security of Shadow Banking”(13CXF081).
文摘It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control.
文摘The current China's social security fund adopts the operation mode of "combination of social pooling and individual accounts".With the increase of the social security fund, the settlement of these problems is very important. In this paper, the analysis based on the problems of China's basic old-age insurance in the current system mode operation, the "nominal account system characteristics and operation of overseas advantages and disadvantages on were described in detail, and points out that the" nominal account "made for a new old-age insurance system mode is conducive to resolving the problems existing in the operation of social security fund, so as to promote the foundation of sustainable development.
基金This work received no external funding,but the National Institute of Informatics of Japan funded the trip of the first and fourth authors to Tokyo to participate in meetings where the idea of this paper was developed.
文摘During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.