期刊文献+
共找到229篇文章
< 1 2 12 >
每页显示 20 50 100
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
1
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
下载PDF
Development of a risk index for cross-border data movement 被引量:1
2
作者 Jin Li Wanting Dong +1 位作者 Chong Zhang Zihan Zhuo 《Data Science and Management》 2022年第3期97-104,共8页
Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security asses... Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data. 展开更多
关键词 cross-border data data security Biomedical data Risk assessment data management
下载PDF
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
3
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
下载PDF
Comparative Study on the Legal Regulation of a Cross-Border Flow of Personal Data and Its Inspiration to China 被引量:3
4
作者 ZHENG Weiwei 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期280-312,共33页
In the context of today's big data and cloud computing,the global flow of data has become a powerful driver for international economic and investment growth.The EU and the U.S.have created two different paths for ... In the context of today's big data and cloud computing,the global flow of data has become a powerful driver for international economic and investment growth.The EU and the U.S.have created two different paths for the legal regulation of the cross-border flow of personal data due to their respective historical traditions and realistic demands.The requirements for data protection have shown significant differences.The EU advocates localization of data and firmly restricts cross-border flow of personal data.The U.S.tends to protect personal data through industry self-regulation and government law enforcement.At the same time,these two paths also merge and supplement with each other.Based on this,China needs to learn from the legal regulatory paths of the EU and the US,respectively,to establish a legal idea that places equal emphasis on personal data protection and the development of the information industry.In terms of domestic law,the Cybersecurity Law of the People's Republic of China needs to be improved and supplemented by relevant supporting legislation to improve the operability of the law;the industry self-discipline guidelines should be established;and various types of cross-border data need to be classified and supervised.In terms of international law,it is necessary to participate in international cooperation based on the priority of data sovereignty and promote the signing of bilateral,multilateral agreements,and international treaties on the cross-border flow of personal data. 展开更多
关键词 cross-border flow personal data legal regulation data sovereignty industry self-regulation key information infrastructure
原文传递
Towards a Global Regulatory Framework for Cross-Border Data Flows——Fundamental Concerns and the China’s Approach 被引量:1
5
作者 LIU Jinr 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2022年第3期412-439,共28页
Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digi... Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digital trade negotiations could not accommodate these challenges,China has initiated the concept of secure cross-border data flow and has launched a dual-track multi-level regulatory system,including control system for overseas transfer of important data,system of crossborder provision of personal information,and system of cross-border data request for justice and enforcement.To explore a global regulatory framework for cross-border data flows,legitimate and controllable cross-border data flows should be promoted,supervision should be categorized based on risk concerned,and the rule of law should be coordinated at home and abroad to promote system compatibility.To this end,the key is to build a compatible regulatory framework,which includes clarifying the scope of important data to define the“Negative List”for preventing national security risks,improving the cross-border accountability for protecting personal information rights and interests to ease pre-supervision pressure,and focusing on data access rights instead of data localization for upholding the jurisdiction of justice and enforcement. 展开更多
关键词 cross-border data flows personal information important data national security jurisdiction of justice and enforcement global regulatory framework
原文传递
The Governance of Cross-Border Data Flows in Trade Agreements:Is the CPTPP Framework an Ideal Way Out? 被引量:1
6
作者 QUAN Xiaolian 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期253-279,共27页
The regulations of cross-border data flows is a growing challenge for the international community.International trade agreements,however,appear to be pioneering legal methods to cope,as they have grappled with this is... The regulations of cross-border data flows is a growing challenge for the international community.International trade agreements,however,appear to be pioneering legal methods to cope,as they have grappled with this issue since the 1990s.The World Trade Organization(WTO)rules system offers a partial solution under the General Agreement on Trade in Services(GATS),which covers aspects related to cross-border data flows.The Comprehensive and Progressive Agreement for Trans-Pacific Partnership(CPTPP)and the United States-Mexico-Canada Agreement(USMCA)have also been perceived to provide forward-looking resolutions.In this context,this article analyzes why a resolution to this issue may be illusory.While they regulate cross-border data flows in various ways,the structure and wording of exception articles of both the CPTPP and USMCA have the potential to pose significant challenges to the international legal system.The new system,attempting to weigh societal values and economic development,is imbalanced,often valuing free trade more than individual online privacy and cybersecurity.Furthermore,the inclusion of poison-pill clauses is,by nature,antithetical to cooperation.Thus,for the international community generally,and China in particular,cross-border data flows would best be regulated under the WTO-centered multilateral trade law system. 展开更多
关键词 cross-border data flows Comprehensive and Progressive Agreement for Trans-Pacific Partnership(CPTPP) United States-Mexico-Canada Agreement(USMCA) World Trade Organization(WTO) CYBERsecurity individual privacy data localization
原文传递
基于OpenFlow的数据流管控系统的研究与实现 被引量:5
7
作者 周昭 林昭文 《软件》 2013年第12期114-116,121,共4页
随着网络技术的不断发展,在现有的网络设备及协议基础之上,对已有网络进行创新性试验变得越来越困难。OpenFlow是为支持网络创新究而提出的新型网络技术,它的出现为部署一个大规模的、完全可控、可定制的实验网络平台提供了可能。本文... 随着网络技术的不断发展,在现有的网络设备及协议基础之上,对已有网络进行创新性试验变得越来越困难。OpenFlow是为支持网络创新究而提出的新型网络技术,它的出现为部署一个大规模的、完全可控、可定制的实验网络平台提供了可能。本文旨在基于OpenFlow设计实现一个数据流管控系统,其主要思想是利用OpenFlow技术实现控制与转发的分离,通过集中控制的方式,实现对全网数据流的管控,提高OpenFlow网络的安全性。 展开更多
关键词 数据流 Openflow技术 网络安全
下载PDF
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing 被引量:5
8
作者 Zhen Chen Wenyu Dong +3 位作者 Hang Li Peng Zhang Xinming Chen Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期82-94,共13页
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile... A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network 展开更多
关键词 data center network network security software defined network collaborative network security multi- tenant network virtualization intelligent flow processing cloud computing
原文传递
Renewable and Nonrenewable Energy Flow Resiliency for Day-to-Day Production and Consumption 被引量:2
9
作者 Bahman Zohuri Farhang Mossavar-Rahmani Masoud Moghaddam 《Journal of Energy and Power Engineering》 2022年第1期13-18,共6页
Energy resilience is about ensuring a business and end-use consumers have a reliable,regular supply of energy and contingency measures in place in the event of a power failure,generating a source of power such as elec... Energy resilience is about ensuring a business and end-use consumers have a reliable,regular supply of energy and contingency measures in place in the event of a power failure,generating a source of power such as electricity for daily needs from an uninterrupted source of energy no matter either renewable or nonrenewable.Causes of resilience issues include power surges,weather,natural disasters,or man-made accidents,and even equipment failure.The human operational error can also be an issue for grid-power supply to go down and should be factored into resilience planning.As the energy landscape undergoes a radical transformation,from a world of large,centralized coal plants to a decentralized energy world made up of small-scale gas-fired production and renewables,the stability of electricity supply will begin to affect energy pricing.Businesses must plan for this change.The challenges that the growth of renewables brings to the grid in terms of intermittency mean that transmission and distribution costs consume an increasing proportion of bills.With progress in the technology of AI(Artificial Intelligence)integration of such progressive technology in recent decades,we are improving our resiliency of energy flow,so we prevent any unexpected interruption of this flow.Ensuring your business is energy resilient helps insulate against price increases or fluctuations in supply,becoming critical to maintaining operations and reducing commercial risk.In the form short TM(Technical Memorandum),this paper covers this issue. 展开更多
关键词 Resilience system energy flow energy storage energy grid BI(business intelligence) AI cyber security decision making in real-time machine learning and deep learning BD(big data)and cloud-based servers for repository and storage of data
下载PDF
数字经济时代数据安全风险防范体系之构建与优化 被引量:2
10
作者 蔡莉妍 《大连理工大学学报(社会科学版)》 CSSCI 北大核心 2024年第3期107-114,共8页
随着人工智能技术的发展,全球进入“数据驱动”时代,数据流动创造价值的同时也带来日趋严重的安全危机。针对以数据滥用、数据泄露、数据污染为代表的数据安全事件,亟须通过建立全面、科学、有效的数据安全风险防范体系加以解决。然而,... 随着人工智能技术的发展,全球进入“数据驱动”时代,数据流动创造价值的同时也带来日趋严重的安全危机。针对以数据滥用、数据泄露、数据污染为代表的数据安全事件,亟须通过建立全面、科学、有效的数据安全风险防范体系加以解决。然而,数据的法律属性与权利归属在理论上尚未廓清,数据流通边界的界定、数据安全综合防御机制的建立、公权与私权的博弈、数据安全保护与数据开发利用之间的内在张力都在不同程度上影响和制约了数据安全风险防范体系的建构。通过明确数据共享的权责归属,健全数据流动安全保护机制以及建立数据全生命周期风险预警防御机制有助于深入探明数据安全保障的政策法制完善之路。 展开更多
关键词 数据安全 风险防范 数据流动 数据权属 法律保障
下载PDF
数据跨境流动安全管理协同研究 被引量:1
11
作者 牛晓宏 夏童 《现代情报》 CSSCI 北大核心 2024年第8期39-50,共12页
[目的/意义]数据跨境流动推动了数字经济发展和国际交流合作,探索数据跨境流动安全管理协同问题,有利于维护数据安全和国家安全,促进数据利用体系与能力建设。[方法/过程]运用Nvivo软件,分析我国数据跨境流动安全管理协同存在的问题与... [目的/意义]数据跨境流动推动了数字经济发展和国际交流合作,探索数据跨境流动安全管理协同问题,有利于维护数据安全和国家安全,促进数据利用体系与能力建设。[方法/过程]运用Nvivo软件,分析我国数据跨境流动安全管理协同存在的问题与产生的原因,基于协同理论和霍尔三维模型,构建数据跨境流动安全管理协同三维模型。[结果/结论]构建以组织协同机制、法制协同机制和资源协同机制3个子机制构成的数据跨境流动安全管理协同机制,并从知识共享、技术实力、文化环境3方面提出数据跨境流动安全管理协同机制运行保障措施,实现数据跨境流动安全管理协同效果。 展开更多
关键词 数据跨境流动 数据安全 安全管理 协同理论 协同机制 霍尔三维模型
下载PDF
国家安全例外条款在数据跨境流动中的适用研究 被引量:1
12
作者 廖丽 武子微 《国际贸易》 CSSCI 北大核心 2024年第8期87-96,共10页
国家安全例外条款对维护国家安全具有重要意义。然而,因存在条文模糊等法律问题,国家安全例外条款在实践中适用于数据跨境流动领域的合法性、合理性仍然值得商榷。在数字经济飞速发展的背景下,各国经常援引国家安全例外条款提出抗辩,或... 国家安全例外条款对维护国家安全具有重要意义。然而,因存在条文模糊等法律问题,国家安全例外条款在实践中适用于数据跨境流动领域的合法性、合理性仍然值得商榷。在数字经济飞速发展的背景下,各国经常援引国家安全例外条款提出抗辩,或将国家安全作为限制数字贸易的理由。面对国际经贸领域逐渐出现的国家安全例外条款的泛化适用倾向及我国企业遭到不合理制裁的问题,我国应重视对国家安全例外条款适用于数字贸易领域的理论研究,明确我国的数据跨境流动规制理念和国家安全例外条款在数据跨境流动领域的合理适用标准,积极推动国际数据跨境流动规则的发展,为促进全球数字经济的健康发展贡献中国智慧和方案。 展开更多
关键词 国家安全例外条款 数据跨境流动 国家安全
下载PDF
欧盟《数据法案》的规范要旨与制度启示:以个人信息保护为视角 被引量:1
13
作者 吴沈括 柯晓薇 《信息通信技术与政策》 2024年第1期2-6,共5页
欧洲议会于2023年11月9日表决通过《数据法案》。该法案明确符合欧盟价值观的数据流转利用和数据治理规则,保障欧洲单一数据市场中数据要素的安全高效流动,进一步平衡个人数据保护和数据自由流通之间的关系。在数字时代下,我国可以在个... 欧洲议会于2023年11月9日表决通过《数据法案》。该法案明确符合欧盟价值观的数据流转利用和数据治理规则,保障欧洲单一数据市场中数据要素的安全高效流动,进一步平衡个人数据保护和数据自由流通之间的关系。在数字时代下,我国可以在个人信息权益保护、统一协调的数据治理机制建立、技术互联与标准建设强化、数据安全保护监管优化等方面吸收借鉴其经验,在充分释放数据要素价值的同时,进一步完善数字时代数据安全与个人信息保护标准,规范数据的共享流通,保障数字经济安全有序发展。 展开更多
关键词 数据法案 个人数据保护 数据流动 数据安全
下载PDF
日本跨境数据流动监管的制度实践及中日合作展望
14
作者 薛志华 曾德华 孟奇勋 《国际贸易》 CSSCI 北大核心 2024年第6期24-31,共8页
当前,全球性的跨境数据流动治理体系尚未形成。为实现数据有序流动与安全发展的目标,积极参与国际数据治理规则制定、推动国内数据管理立法成为各国共通的做法。日本的跨境数据流动监管模式在借鉴欧美等国家数据治理经验,融合多元目标... 当前,全球性的跨境数据流动治理体系尚未形成。为实现数据有序流动与安全发展的目标,积极参与国际数据治理规则制定、推动国内数据管理立法成为各国共通的做法。日本的跨境数据流动监管模式在借鉴欧美等国家数据治理经验,融合多元目标的基础上,形成了自身的“协调性特色”。这表现在日本坚持多边主义理念,对内不断完善数据治理立法,对外积极参与双边、多边国际规则的制定,并进一步提出数据安全流动全球性倡议。基于Line案的实证分析可以发现,当前中日之间开展跨境数据流动监管合作拥有广阔前景,但在具体规则制度协调中仍面临挑战。为此,中日两国可通过推进规则协调、优化机制建设方式,积极探求两国在跨境数据流动监管领域的合作空间,提升监管治理效果。 展开更多
关键词 跨境数据流动 数据监管 数据安全 中日合作
下载PDF
数据跨境流通规则博弈与中国应对
15
作者 郭朝先 李婷 罗芳 《中国流通经济》 CSSCI 北大核心 2024年第9期27-38,共12页
如何安全有效促进数据跨境流通和赢得数据跨境流通治理话语权主导权,成为各国博弈的焦点。当前,受各国数据治理理念,核心利益诉求,深层次个人数据安全、国家数据主权、数据跨境自由流通不可兼得的“三元悖论”以及传统数据治理手段制约... 如何安全有效促进数据跨境流通和赢得数据跨境流通治理话语权主导权,成为各国博弈的焦点。当前,受各国数据治理理念,核心利益诉求,深层次个人数据安全、国家数据主权、数据跨境自由流通不可兼得的“三元悖论”以及传统数据治理手段制约,国际数据跨境流通领域形成多元治理机制并存、多套治理模板竞争、多轮博弈持续演进的博弈态势,以及数据跨境流通治理碎片化割裂化的局面。当前,我国以国家安全与数据跨境有序自由流动并重为基本特征的数据跨境流通治理主张,不仅契合我国发展实际,而且符合大多数发展中国家的愿望。总体而言,数据跨境流通治理中国方案是一种合意的数据跨境流通治理方案,但在具体实践中我国数据跨境流通治理依然存在一些短板,如有些规定不太合理导致企业数据跨境流通操作成本高、数据跨境流通治理参与度低导致数据跨境流通互操作性较差、与国际高标准数字经贸规则存在衔接障碍等,同时面临国际上异样的声音,甚至存在被污名化、被打压的风险,不利于数据跨境流通治理中国方案效力与国际影响力的提升。为在数据跨境流通治理领域赢得话语权主导权、推进数据跨境流通国际治理,我国应坚持多边主义,推动以联合国和WTO为主导的国际机制建设;推进“数字丝绸之路”建设,扩大中国方案影响力;加强双多边合作,增强数据跨境流通互操作性;对接高标准数字经贸规则,提高数据跨境流通治理能力。 展开更多
关键词 数据跨境流通 数据流通治理规则 数据安全 中国方案
下载PDF
《尼日利亚数据保护法》解读与中国企业应对
16
作者 谢舟 刘畅 《海关与经贸研究》 2024年第4期98-111,共14页
尼日利亚高度重视本国数字经济发展,提出多项倡议规划发展前路。中国诸多数字贸易企业进入尼日利亚市场开展业务,并取得显著成就。《尼日利亚数据保护法》的发布,表明尼日利亚当局对个人信息保护的重视,也使在尼日利亚中国数字贸易企业... 尼日利亚高度重视本国数字经济发展,提出多项倡议规划发展前路。中国诸多数字贸易企业进入尼日利亚市场开展业务,并取得显著成就。《尼日利亚数据保护法》的发布,表明尼日利亚当局对个人信息保护的重视,也使在尼日利亚中国数字贸易企业在保障数据主体权利以及合规开展跨境数据流动等方面面临新要求新挑战。本文聚焦该法,通过解释研读该法的重要条款细则及与欧盟《通用数据保护条例》《中华人民共和国数据安全法》和《中华人民共和国个人信息保护法》等法规的不同,分析中国在尼日利亚开展数字贸易企业在“数据安全”“数据主体权利”“跨境数据流动”等条款下受到的影响,并针对性地就以上几方面为企业提出应对策略,以此助力中国企业在尼日利亚合规合法运营和发展数字贸易业务。 展开更多
关键词 尼日利亚 数字贸易:数据保护法 数据安全 跨境数据流动
下载PDF
跨境数据流动规制的模式差异、协调路径与中国方案
17
作者 孙南翔 《法治社会》 2024年第3期105-115,共11页
截至目前,全球并未形成统一的数据流动规则体系,数据跨境流动规则主要分为美国模式、欧盟模式和中国模式。由于主要数字经济体在数据跨境流动与数据安全保护之间的关注焦点不同,以全球主义或国际软法为方法推进高标准的全球统一数据流... 截至目前,全球并未形成统一的数据流动规则体系,数据跨境流动规则主要分为美国模式、欧盟模式和中国模式。由于主要数字经济体在数据跨境流动与数据安全保护之间的关注焦点不同,以全球主义或国际软法为方法推进高标准的全球统一数据流动规则体系构建的方案,在短期内难以实现。作为数字经济大国,我国应转变对商业数据跨境流动相对保守的态度。我国可以全面与进步跨太平洋伙伴关系协定(CPTPP)“电子商务”章节为主要内容,探索通过与韩国、日本及欧洲、东南亚国家等缔结专门的数字贸易协定,推动跨境流动规则体系的建设。我国还应加快对区域全面经济伙伴关系协定(RCEP)等经贸协定“电子商务”规则的国内转化立法,特别是积极引入数据跨境流动的风险评估理念与制度。 展开更多
关键词 数据跨境流动 统筹发展与安全 自由贸易协定 风险评估 数据贸易协定
下载PDF
数据要素流通安全治理:体系架构与实践进路 被引量:4
18
作者 马乐存 裴雷 李白杨 《农业图书情报学报》 2024年第3期46-58,共13页
[目的/意义]数据要素流通的治理体系与政策研究是当前中国数据治理领域亟待解决的重要问题,探讨其流通的政策制定与治理体系,对于中国把握数据流通安全,推进数据要素市场化配置具有重要作用。[方法/过程]首先,本研究立足于中国数据要素... [目的/意义]数据要素流通的治理体系与政策研究是当前中国数据治理领域亟待解决的重要问题,探讨其流通的政策制定与治理体系,对于中国把握数据流通安全,推进数据要素市场化配置具有重要作用。[方法/过程]首先,本研究立足于中国数据要素市场安全可信、自主可控的现实要求,从数据主权、数据市场、数据流通3个层面进行数据安全风险分析,提出数据要素市场风险治理对策的“安全-公平-效率”三角架构;其次,面向数据要素流通市场政府主导、平台主营、企业主体、用户参与的特点,借助协同共治理论和价值共创理论,构建了具有中国特色的数据要素市场多方协同共治模式框架;最后,基于数据要素市场治理的三级体系、五维标准,提出了安全治理与可信生态体系及数据跨境流通的国际数据治理规则体系对接方法,并构建了面向全国统一数据要素市场的中国特色治理体系。[结果/结论]面向数据主权、数据市场、数据流通中的安全风险,应对数据主权纠纷与流通市场运行态势开展识别与监测,建立政府主导、平台主营、企业主体、用户参与的多方协同共治模式;在对数据要素市场进行评估时,应采取定性与定量相结合、专家意见与客观数据相融合、目标与成果相对照的混合评估方法;针对不同数据类型,应分级分类厘清控制边界和使用范围,明晰数据所有权、使用权和收益权,同时建立数据确权平台,对数据服务主体、数据流通过程、数据流通规则等进行审核及登记认证,确保数据流通的规范性。 展开更多
关键词 数据要素 数据安全 数据流通 治理体系 安全风险
下载PDF
HiLog:OpenHarmony的高性能日志系统
19
作者 吴圣垚 王枫 +4 位作者 武延军 凌祥 屈晟 罗天悦 吴敬征 《软件学报》 EI CSCD 北大核心 2024年第4期2055-2075,共21页
日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而Op... 日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而OpenHarmony的开源特性使第三方开发者可以为其贡献核心代码.为了解决Open Harmony日志系统缺乏的问题,主要开展如下工作:(1)分析当今主流日志系统的技术架构和优缺点;(2)基于OpenHarmony操作系统的异构设备互联特性设计HiLog日志系统模型规范;(3)设计并实现第1个面向OpenHarmony的日志系统HiLog,并贡献到OpenHarmony主线;(4)对HiLog日志系统的关键指标进行测试和对比试验.实验数据表明,在基础性能方面,HiLog和Log的日志写入阶段吞吐量分别为1500 KB/s和700 KB/s,相比Android日志系统吞吐量提升114%;在日志持久化方面,HiLog可以3.5%的压缩率进行持久化,并且丢包率小于6‰,远低于Log.此外,HiLog还具备数据安全、流量控制等新型实用能力. 展开更多
关键词 操作系统 日志系统 开源软件 数据安全 流量控制
下载PDF
我国数据出境安全风险要素体系研究 被引量:3
20
作者 董克 吴佳纯 马廷灿 《情报理论与实践》 CSSCI 北大核心 2024年第6期49-59,共11页
[目的/意义]构建数据出境风险要素体系,对识别数据出境安全风险,把握数据出境安全整体态势,提升国家安全风险管理水平具有重要意义。[方法/过程]以我国数据出境流动的现实场景和典型事件为依据,挖掘数据出境安全风险的主要来源维度;结... [目的/意义]构建数据出境风险要素体系,对识别数据出境安全风险,把握数据出境安全整体态势,提升国家安全风险管理水平具有重要意义。[方法/过程]以我国数据出境流动的现实场景和典型事件为依据,挖掘数据出境安全风险的主要来源维度;结合数据跨境服务主体调查,提出数据出境安全风险要素集,并构建数据出境安全风险框架;基于专家知识对风险要素进行权重排序和评估。[结果/结论]研究结果表明:内容维度的风险要素受到专家关注程度最高,内容的分级分类以及个人隐私保障是其中的重点;黑客、合作方等境外主体造成的风险具有极强的破坏力;出境环境变化与出境数据内部管理虽然同样容易产生风险,但负面影响相对较低。基于此,从法制保障、多元协同与关键技术角度提出数据跨境流动风险应对建议。 展开更多
关键词 数据出境 风险要素体系 数据安全 数据跨境流动 国家安全 风险管理
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部