期刊文献+
共找到9,927篇文章
< 1 2 250 >
每页显示 20 50 100
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
1
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Cloud Computing: Purpose and Future
2
作者 Robb Shawe 《Journal of Software Engineering and Applications》 2024年第10期763-769,共7页
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o... Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency. 展开更多
关键词 Cloud Computing Hybrid Cloud Private Cloud public Cloud IAAS PAAS SAAS On-Premises PLATFORM Data security Systems
下载PDF
Exploring the Commuters’ Willingness-to-Pay and Its Influencing Factors for an Improved Public Bus Service in Dhaka City
3
作者 Ayesha Umme Kojima Aya Kubota Hisashi 《Journal of Transportation Technologies》 2023年第2期139-157,共19页
Improved transportation services are a crucial component of urban growth, particularly in emerging cities like Dhaka. Ensuring an improved public bus service quality is a challenge for the city’s transport planners a... Improved transportation services are a crucial component of urban growth, particularly in emerging cities like Dhaka. Ensuring an improved public bus service quality is a challenge for the city’s transport planners and policy makers. Nevertheless, this challenge can’t be met without the support of the residents of this city. This study intends to evaluate the commuters’ willingness to pay (WTP) for an improved and better public bus service quality in Dhaka city. It also attempts to explore the factors affecting the commuters’ WTP amounts. In order to accomplish the study’s goals, a stated preference survey was designed to enquire into the whys and wherefores of female passengers’ harassment on public buses and also to prefer some influential service quality features. WTP values of respondents were calibrated using binary and ordinal logistic models, and these models were developed using SPSS version 26. The results indicate that the majority of respondents were willing to pay more for better service facilities, and they point to security as the most important factor in determining how much extra fare commuters are willing to pay. The results also demonstrate that commuters’ WTP amounts are highly influenced by the respondents’ monthly income. Results from this study have important policy implications, such as protecting women’s safety on public transportation and taking commuters’ socio-demographic characteristics into account before enacting any legislation or increasing fares. 展开更多
关键词 WTP public Bus HARASSMENT Improved Service Quality security Socio-Demographic Features
下载PDF
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
4
作者 Linli Wang Hu Wang Hanlu Lei 《Journal of Computer and Communications》 2023年第5期194-204,共11页
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro... At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. . 展开更多
关键词 Social security Emergencies Network public Opinion Emotion Analysis Graph Neural Network TextLevelGCN BERT
下载PDF
The Malicious Uses of Artificial Intelligence(MUAI)and Psychological Security in the Case of Iran
5
作者 Davoud Gharayagh-Zandi 《International Relations and Diplomacy》 2023年第6期266-270,共5页
Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manne... Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI. 展开更多
关键词 AI Iran malicious uses psychological security public policy
下载PDF
Implementation of a Comprehensive Information Management Platform for Public Security Based on Java Technology
6
作者 Jin Xue Yali Yuan 《计算机科学与技术汇刊(中英文版)》 2023年第1期11-16,共6页
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development... Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system. 展开更多
关键词 public security Comprehensive Business information System JAVA WORKFLOW Web information security
下载PDF
Research on the Construction of Safety Guarantee System for Police Technical and Tactical Training in Public Security Colleg
7
作者 Yuehua Zhang Ping Wang 《Journal of Educational Theory and Management》 2019年第1期17-21,共5页
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio... The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period. 展开更多
关键词 public security COLLEGES POLICE TECHNICAL and tactical TRAininG security system
下载PDF
Comparison of Chinese and Foreign Urban Public Security Treatment Mechanisms and Analysis of Policy References
8
作者 Li Xuejun Zhang Mingyu 《工程科学(英文版)》 2007年第1期49-56,共8页
From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment ... From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations. 展开更多
关键词 public security urban management COMPARISON and ANALYSIS security system
下载PDF
On the Professional Development of Teachers in Public Security colleges and universities
9
作者 SI Jianping SONG Liqu 《International English Education Research》 2017年第4期66-68,共3页
Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our cou... Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education. 展开更多
关键词 public security colleges teachers professional development team building
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
10
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu... In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract. 展开更多
关键词 Psychological Contract public security colleges and universities teacher management mechanism
下载PDF
Poetic Justice: Novel Reading and the Perfection of Human Public Value
11
作者 Tianyong Tang 《教育研究前沿(中英文版)》 2022年第2期125-128,共4页
Taking novels as the breakthrough point,the American thinker,Martha C.Nussbaum,strongly criticizes the materialization of human beings by economic utilitarianism and legal economics,as well as the estrangement and ind... Taking novels as the breakthrough point,the American thinker,Martha C.Nussbaum,strongly criticizes the materialization of human beings by economic utilitarianism and legal economics,as well as the estrangement and indifference between human beings in the book Poetic Justice:The Literary Imagination and Public Life.Through being read,the novels enter into the field of public life,expand the area of human emotion,preach human justice and promote the perfection of human values. 展开更多
关键词 Martha C.Nussbaum Poetic justice NOVEL Economic Utilitarianism public Value
下载PDF
欧洲法院国家安全情报领域算法规制的经验及其借鉴——以La Quadrature du Net and Others案为例
12
作者 吴常青 张春晖 罗佳明 《情报探索》 2024年第8期49-55,共7页
[目的/意义]La Quadrature du Net and Others案是欧盟法院第一次以判决的形式回应成员国国家安全情报领域算法运用的立法,对其进行研究不仅能够拓展理论研究的视界,也可为我国相关制度的构建提供镜鉴。[方法/过程]采取案例分析法,深入... [目的/意义]La Quadrature du Net and Others案是欧盟法院第一次以判决的形式回应成员国国家安全情报领域算法运用的立法,对其进行研究不仅能够拓展理论研究的视界,也可为我国相关制度的构建提供镜鉴。[方法/过程]采取案例分析法,深入分析欧盟法院国家安全情报领域算法规制的逻辑基点、路径和方法。[结果/结论]该判决对欧洲人权法院及法国均产生重要影响,但无论是传统情报监督路径与方法,还是新兴算法规制路径与方法,均存缺憾。我国在推进国家安全情报领域算法运用的同时,要对其基本权利干预性有充分认识,应通过立法强化国家安全情报领域算法运用的规制。 展开更多
关键词 国家安全情报 算法 算法规制 欧盟法院 法国
下载PDF
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
13
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
下载PDF
The Governance of Complementary Global Regimes Dealing With War and Crime:The Interaction Between the United Nations and the International Criminal Court
14
作者 Andrea Marrone 《Journalism and Mass Communication》 2023年第1期17-25,共9页
The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an i... The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance? 展开更多
关键词 international Law international Relations Peace and security international Criminal justice
下载PDF
Dialectic Approaches and Public Policy Interactions for Social, Environmental and Health Problems: Challenges for Health Promotion across Territorial Scales
15
作者 Leandro Luiz Giatti Ricardo Agum Ribeiro Renata Ferraz de Toledo 《Health》 2014年第7期607-615,共9页
A constant reproduction of environmental injustices and health iniquities has demanded the employment of participatory/dialectic approaches to research and to intervene in the reality making possible the involvement o... A constant reproduction of environmental injustices and health iniquities has demanded the employment of participatory/dialectic approaches to research and to intervene in the reality making possible the involvement of social actors in healthy public policies. On this framework, the aim of this paper is to analyse scientific production with dialectic approaches associated with public policies in the context of social, environmental and health problems, considering territorial scales of intervention and the correspondence with some relevant strategies of health promotion. A systematic bibliographic review was applied on a wide pan-disciplinary scientific data base and 36 papers were analysed and classified by their territorial scales of approach. The amount of papers found and their spread through a variety of journals showed a modest, but increasing production which has been dispersed in terms of knowledge areas. Within the classification of territorial approaches, 14 papers were classified as local, 5 as expanded and 17 as a multi-level. Although the papers classified as local approaches were in a good structure of stakeholders’ participation, they are limited to dealing with the global driving forces that reproduce the environmental injustices. Regarding this limitation, the multilevel approaches were identified as more opportune to jointly deal with social, environmental and health problems by means of allowing interaction through multiple territorial scales, fomenting the strengthening of community action, creating supportive environments, and building healthy public policies. 展开更多
关键词 Health PROMOTION PARTICIPATORY Research public Policy ENVIRONMENTAL justice
下载PDF
A Flaw in the Security Proof of BDOP-PEKS and PEKS-STAT
16
作者 ZHANG Yajuan ZHU Yuefei +1 位作者 GU Chunxiang FU Changchun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期25-28,共4页
Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security p... Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction. 展开更多
关键词 provable security public key encryption with keyword search(PEKS) GBDH BDOP-PEKS PEKS-inD-CKA
下载PDF
Exploration of Influencing Factors of Public Security
17
作者 SUN Shuai GAO Debin LI Ziying 《Journal of Landscape Research》 2022年第4期33-38,共6页
Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in diffe... Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A. 展开更多
关键词 public security CASE influencing factors
下载PDF
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
18
作者 Adam Aloyce Semlambo Didas Malekia Mfoi Yona Sangula 《Journal of Computer and Communications》 2022年第11期29-43,共15页
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har... All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy. 展开更多
关键词 information Systems information security public Higher Learning institutions IAA
下载PDF
Research on the Analytical Efficiency of Public Security Intelligence Based on SEM
19
作者 ZHANG Ting ZHANG Lebing YUAN Shenghe 《Psychology Research》 2022年第3期87-99,共13页
In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a pro... In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously. 展开更多
关键词 SEM the public security intelligence the analytical efficiency
下载PDF
Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance
20
作者 Jian LIN 《International Journal of Technology Management》 2015年第8期69-71,共3页
Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security... Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept. 展开更多
关键词 public security COMMUNITY POLICinG inNOVATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部