期刊文献+
共找到20,877篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Construction of Pharmacovigilance System for Marketing Authorization Holders in China
1
作者 Zhao Jiai Tian Lijuan 《Asian Journal of Social Pharmacy》 2024年第2期106-116,共11页
Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m... Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage. 展开更多
关键词 marketing authorization holder(MAH) pharmacovigilance system good pharmacovigilance practice
下载PDF
守正创新 勇担时代使命——中山大学学报自然科学版创刊70周年(1955—2024)
2
作者 詹拔群 张冰 《中山大学学报(自然科学版)(中英文)》 CAS 北大核心 2025年第1期28-39,共12页
本文介绍《中山大学学报(自然科学版中英文)》的创刊与源流,分为创刊初期(1955—1966)、首批复刊(1973—1978)、改革开放后(1979—2012)和迈进新时代(2013—2023)四个时间段回顾该刊70年的办刊历程,着重介绍了在各个时期为该刊的发展壮... 本文介绍《中山大学学报(自然科学版中英文)》的创刊与源流,分为创刊初期(1955—1966)、首批复刊(1973—1978)、改革开放后(1979—2012)和迈进新时代(2013—2023)四个时间段回顾该刊70年的办刊历程,着重介绍了在各个时期为该刊的发展壮大作出了重要贡献的中山大学学者及其发表的成果,展现中山大学与该刊在推动国家科学技术发展进步方面所作出的贡献。新时代以来,自然科学版致力于内涵式高质量发展取得了成效。该刊以建设世界一流科技期刊为目标,采取了策划组织大型专题专辑、变更期刊文种为中英文、实施稿件质量提升计划、不断完善数字化出版等重要办刊举措,大力推进国际化高水平科技期刊建设。 展开更多
关键词 科技期刊 中山大学学报 自然科学版 重要作者 数字化出版
下载PDF
改进基本医疗(初级保健)研究报告内容的CRISP共识声明
3
作者 William R.Phillips Elizabeth Sturgiss +6 位作者 Paul Glasziou Tim Colde Hartman Aaron M.Orkin Pallavi Prathivadi Joanne Reeve Grant M.Russell Chris van Weel 《中国全科医学》 CAS 北大核心 2025年第4期385-392,共8页
基本医疗(初级保健)是一门独特的临床专业和研究学科,具有其自身的视角和方法。该领域的研究使用多种研究方法和研究设计来调查各种主题。基本医疗(初级保健)的多样性对其研究内容的报告提出了挑战,尽管已有大量报告指南问世,但没有一... 基本医疗(初级保健)是一门独特的临床专业和研究学科,具有其自身的视角和方法。该领域的研究使用多种研究方法和研究设计来调查各种主题。基本医疗(初级保健)的多样性对其研究内容的报告提出了挑战,尽管已有大量报告指南问世,但没有一项指南专门针对基本医疗(初级保健)学科的需求而设。基本医疗(初级保健)研究报告内容的条目共识(CRISP)清单,旨在指导基本医疗(初级保健)研究的报告,包括提供基本医疗(初级保健)相关人群(从业者、患者和社区)所需的信息。CRISP清单完善了现有指南,有利于基本医疗(初级保健)研究结果的报告、传播和应用。先前的CRISP研究,探索了在该领域改善研究内容报告的可能性。工作组通过对国际化、跨学科和跨专业的基本医疗(初级保健)社区的调查,确定了基本医疗(初级保健)研究报告中需要包含的基本条目。工作组开展了一项包含两轮德尔菲的研究,对必要的条目达成了共识,并汇总成清单。CRISP清单包含24个条目,涵盖了基本医疗(初级保健)研究报告中的研究团队、患者、研究参与者、健康状况、临床接触、护理团队、干预、研究测量、照护环境,以及研究结果的实施等方面。并非全部条目都适用于每种研究设计或主题。CRISP指南为设计和报告以下三类研究提供了参考信息:(1)基本医疗(初级保健)研究人员开展的研究,(2)其他研究人员在基本医疗(初级保健)人群和环境中开展的研究,(3)旨在应用于基本医疗(初级保健)实践中的研究,从而改进对临床服务和研究过程背景的报告。这对于解释研究结果并将其应用于基本医疗(初级保健)的不同人群和环境至关重要。 展开更多
关键词 指南 研究报告 清单 基本医疗 研究 共识 利益相关者参与 德尔菲研究 研究影响 研究设计 调查和问卷 作者 编辑 审稿人 文章 出版 期刊
下载PDF
A Workflow Authorization Model Based on Credentials 被引量:1
4
作者 XING Guang-lin HONG Fan CAI Hui 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期198-202,共5页
A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state wh... A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state which nicely ensure synchronizing authorization flow with workflow; specifies authorization policy not only based on user identifiers but also based on user qualifications and characteristics; defines a set of constraint rules for a task and seek the eligible users to execute the task according to the type of each constraint rule which realize dynamic separation of duty; and realizes the access granularity of authorization ranging from objects to specific parts of objects which ensure the least privilege constraints much more better. 展开更多
关键词 CREDENTIALS WORKFLOW authorization model
下载PDF
Authorization Management Framework Based on Joint Trust-Risk Evaluation 被引量:1
5
作者 YANG Qiuwei WU Sunyong +1 位作者 HONG Fan LIAO Junguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期9-12,共4页
Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource ... Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource are granted on the basis of their trust relation in distributed environment. Nevertheless, dynamic change of the status of credential and chain of trust induces to uncertainty of trust relation. Considering uncertainty of authorization and analyzing deficiency of authorization model only based on trust, we proposes joint trust-risk evaluation and build the model based on fuzzy set theory, and make use of the membership grade of fuzzy set to express joint trust-risk relation. Finally, derivation principle and constraint principle of joint trust-risk relationships are presented. The authorization management model is defined based on joint trust-risk evaluation, proof of compliance and separation of duty are analyzed. The proposed model depicts not only trust relationship between principals, but also security problem of authorization. 展开更多
关键词 trust management authorization management risk evaluation proof of compliance fuzzy set
下载PDF
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
6
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
下载PDF
A Quantum Authorization Management Protocol Based on EPRPairs 被引量:1
7
作者 Yan Chang Shibin Zhang +5 位作者 Lili Yan Guihua Han Haiquan Song Yan Zhang Xueyang Li Qirun Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期1005-1014,共10页
Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is ... Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols. 展开更多
关键词 Quantum authorization management entanglement swapping fin-grained rights division
下载PDF
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization 被引量:1
8
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3801-3813,共13页
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen... Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme. 展开更多
关键词 CP-ABE geohash new time tree(NTT) multi authorization dynamic attribute
下载PDF
An Approach for Handling Conflicts in Authorization
9
作者 ZHANG Mingsheng ZHANG Mingyi 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期626-630,共5页
Based on logic programs, authorization conflicts and resolution strategies are analyzed through the explanation of some examples on the health care sector. A resolution scheme for handling conflicts in high level auth... Based on logic programs, authorization conflicts and resolution strategies are analyzed through the explanation of some examples on the health care sector. A resolution scheme for handling conflicts in high level authorization specification by using logic program with ordered disjunction (LPOD) is proposed. The scheme is useful for solving conflicts resulted from combining positive and negative authorization, complexity of authorization management, and less clarity of the specification. It can well specify kinds of conflicts (such as exceptional conflicts, potential conflicts), and is based on literals and dependent contexts. Thus it is expressive and available. It is shown that authorizations based on rules LPOD is very important both in theory and practice. 展开更多
关键词 authorization authorization conflict conflict resolution schema logic program with ordered disjunction
下载PDF
A Family of RBAC-Based Workflow Authorization Models
10
作者 HONGFan XINGGuang-lin 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期324-328,共5页
A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permissio... A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permission which means that a user can perform certainoperation on a task only for a time interval, this not only ensure that only authorized users couldexecute a task but also ensure that the authorization flow is synchronised with workflow. The twoadvance models of RWAM deal with role hierarchy and constraints respectively RWAM ranges from simpleto complex and provides a general reference model for other researches and developments of suchareah. 展开更多
关键词 workflow authorization temporal permission RBAC
下载PDF
TrustedRBAC——A Distributed Authorization Infrastructure Span Multiple Autonomous Domains
11
作者 WANGZhi-gang LUZheng-ding LIRui-xuan WUWei WANGXiao-gang 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期694-698,共5页
TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to def... TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. This paper describes the TrustedRBAC model and its scalable design and implementation. 展开更多
关键词 X.509 attribute certificate RBAC authorization virtual enterprise
下载PDF
Power authorization by adding digital controller to electrical equipment
12
作者 单庆晓 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期281-286,共6页
Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor. This paper pro poses a digitalized power system based on synthetical transmission carrier which makes the power system a... Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor. This paper pro poses a digitalized power system based on synthetical transmission carrier which makes the power system also serves as a data communication system with the same structure. Loads get authorized before powered on, so their behaviour is predictable. Digitalized power system includes such basic units as digital power source, hub and load. Their concepts are explained, their behaviour and implements arc also described in detail. Real time distribution of residual power is applied, which makes prompt authorization possible. Communication protocol and load address assignments are also presented in this paper. A prototype is built and the results verify the effect of the new proposed power system. 展开更多
关键词 power distribution power transmission power authorization power system
下载PDF
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
13
作者 Zhikui CHEN Song YANG 《Communications and Network》 2009年第2期74-81,共8页
Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (... Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on a user privacy protected infrastructure is our focus. Based on a user-centric vir-tual identity defined by EU IST project Daidalos, this paper firstly proposes an effective infrastructure which protects the context-driven access policies for online services in order to avoid attacks by malicious eaves-droppers. In the proposed infrastructure, SMAL and Diameter are used to securely protect and deliver au-thenticated and authorized entities and XACML is used to authorize the user-level privacy policy. On the basis of it, a dynamic fast authentication and authorization handover mechanism is proposed which can save one trip communication time consummation between administrative domains. 展开更多
关键词 PRIVACY Policy Security VID AUTHENTICATION authorization
下载PDF
Embedding Authentication &Authorization in Discovery Protocols for Standard Based Publish/Subscribe Middleware: A Performance Evaluation
14
作者 Fabrizio Ronci Marco Listanti 《Communications and Network》 2011年第1期39-49,共11页
Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to ... Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well ex-ploited by Peer-To-Peer (P2P) systems, Internet-wide as long as private ones, like in Public Safety or Civil Protection Communication Systems;but Pub/Sub specifications, and DDS/RTPS (Real Time Publish Sub-scribe) as well, usually do not provide Authentication & Authorization (AA) mechanisms. In the present work two important novelties are assessed: a possible scheme to implement AA in DDS/RTPS networks and a time performance evaluation study about embedded Authentication in RTPS. 展开更多
关键词 MIDDLEWARE PUBLISH/SUBSCRIBE Data Distribution Service AUTHENTICATION authorization
下载PDF
Authorization Administration in a Distributed Multi-application Environment
15
作者 DUANSujuan HONGFan LIXinhua 《Geo-Spatial Information Science》 2004年第4期303-307,共5页
To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new acce... To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new access control model ED-RBAC(Extended Role Based AccessControl Model) for the distributed environment. We propose an extendable hierarchical authorizationassignment framework and design effective role-registeringi role-applying and role-assigningprotocol with symmetric and asymmetric cryptographic systems. The model can be used to simplifyauthorization administration in a distributed environment with multiple applications. 展开更多
关键词 authorization administration role-based control distributed environment
下载PDF
Copyright Authorization Statement
16
《Meteorological and Environmental Research》 CAS 2013年第2期58-58,共1页
Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repr... Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction, distribution, compilation and information network transmission rights. 展开更多
关键词 Copyright authorization Statement
下载PDF
Copyright Authorization Statement
17
《Agricultural Biotechnology》 CAS 2014年第2期62-62,共1页
Should the article be accepted and published by Agricultural Biotechnology, the author hereby grants exclu- sively to the editorial department of Agricultural Biotechnology the digital reproduction, distribution, comp... Should the article be accepted and published by Agricultural Biotechnology, the author hereby grants exclu- sively to the editorial department of Agricultural Biotechnology the digital reproduction, distribution, compilation and information network transmission rights. 展开更多
关键词 Copyright authorization Statement
下载PDF
Copyright Authorization Statement
18
《Meteorological and Environmental Research》 CAS 2013年第4期63-63,共1页
Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repr... Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction, distribution, compilation and information network transmission rights. 展开更多
关键词 Copyright authorization Statement
下载PDF
Copyright Authorization Statement
19
《Meteorological and Environmental Research》 CAS 2013年第7期52-52,共1页
Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repr... Should the article be accepted and published by Meteorological and Environmental Research, the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction, distribution, compilation and information network transmission rights. 展开更多
关键词 Copyright authorization Statement
下载PDF
Copyright Authorization Statement
20
《Agricultural Biotechnology》 CAS 2016年第2期47-47,共1页
Should the article be accepted and published by Agricultural Biotechnology, the author hereby grants exclusively to the editorial department of Agricultural Biotechnology the digital reproduction, distribution, compil... Should the article be accepted and published by Agricultural Biotechnology, the author hereby grants exclusively to the editorial department of Agricultural Biotechnology the digital reproduction, distribution, compilation and information network transmission rights. 展开更多
关键词 Copyright authorization Statement
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部