期刊文献+
共找到1,427篇文章
< 1 2 72 >
每页显示 20 50 100
The Privilege of the Medieval Universitiesfrom the Perspective of Game Theory
1
作者 李海莉 徐朋辉 《石家庄经济学院学报》 2016年第3期104-107,共4页
在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免... 在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免役权以及独立颁发教学许可证等特权,诸多的特权为大学的未来发展壮大奠定了坚实的基础,至今仍产生深远影响. 展开更多
关键词 博弈 中世纪 大学 特权
下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
2
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
下载PDF
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel 被引量:2
3
作者 ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China 2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期137-141,共5页
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi... A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost. 展开更多
关键词 Key words intrusion detection privilege flow model HSMM
下载PDF
Fas ligand expression in colon cancer:A possible mechanism of tumor immune privilege 被引量:6
4
作者 WeiZhang Er-XunDing +4 位作者 QiangWang Da-QiaoZhu JinHe Yu-LiLi Yuan-HeWang 《World Journal of Gastroenterology》 SCIE CAS CSCD 2005年第23期3632-3635,共4页
AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninet... AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes. 展开更多
关键词 Fas ligand Colon cancer Immune privilege
下载PDF
Effect of Vasocation Intestinal Peptide on Immune Privilege of the Rat Testis 被引量:1
5
作者 Wei WANG Ye-bin XI Guang-jie CHEN Jing HAO Bao-guo WANG Tian-wei SHEN Li-hua JIANG Wei-yi LI 《Journal of Reproduction and Contraception》 CAS 2008年第1期1-8,共8页
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex... Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells. 展开更多
关键词 vasocation intestinal peptide (VIP) Leydig cell FASL TFG-β immune privilege
下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
6
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
7
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI privilege management infrastructure)
下载PDF
Use and Abuse of Privileged Information in Italian Listed Companies
8
作者 Annalisa Baldissera 《Chinese Business Review》 2019年第1期14-29,共16页
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ... Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements. 展开更多
关键词 privileged INFORMATION FINANCIAL statements LISTED COMPANIES
下载PDF
Farmers' Privilege under the Protection of New Plant Varieties
9
作者 YANG De-xing Department of Human Sciences,Suzhou Polytechnic Institute of Agriculture,Suzhou 215008,China 《Asian Agricultural Research》 2012年第7期86-88,共3页
This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analy... This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analyzes shortcomings of farmers'privilege regulations,and puts forward that it is required to improve farmers'privilege regulations in subjects,objects and contents of rights on the basis of learning from advanced legislation experience of foreign countries,and build the interest sharing mechanism between breeders and farmers. 展开更多
关键词 PROTECTION of NEW PLANT VARIETIES Farmers’privileg
下载PDF
Identity Governance Framework for Privileged Users
10
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
下载PDF
Discussion on the privilege system in the laws of the Ming Dynasty
11
作者 Chert Kai 《International English Education Research》 2014年第12期41-42,共2页
An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the fo... An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the former Yuan Dynasty could not suit the demands of the development of the new situations, so he developed the new statutes. The laws of the Ming Dynasty absorbed the lessons that the Yuan government law and discipline ceased to be binding or become lax, and put forward that the laws must be strict, and abolished the system of the prime minister, showing a high degree of centralization. The laws of the Ming Dynasty had the important influence on the political thoughts in the late feudal society, so the researches on the legal systems in the Ming dynasty have practical significance. This paper briefly expounds the legal privileges of the Ming Dynasty for reference. 展开更多
关键词 Law of the Ming Dynasty system of privilege CENTRALIZATION
下载PDF
恢复原始设定的Re-pair Privileges Utility 1.0
12
《电子与金系列工程信息》 2002年第7期9-9,共1页
关键词 苹果公司 REPAIR privileges Utility1.0 系统需求 警告讯息
下载PDF
Chinese-Language Software-A Privilege for Chinese
13
作者 YANG TAOYUAN 《China Today》 1994年第10期61-62,共2页
Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chin... Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long. 展开更多
关键词 Chinese-Language Software-A privilege for Chinese
下载PDF
Genius Is Not a Privilege of the Few
14
作者 LI CHAOCHEN and HOU RUILI 《China Today》 1996年第10期28-29,共2页
GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYw... GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYwordsoutof35givent... 展开更多
关键词 Genius Is Not a privilege of the Few
下载PDF
“调解不成无损于现状”机制的功能与法理基础
15
作者 宋连斌 武振国 周健 《东北大学学报(社会科学版)》 北大核心 2024年第1期100-107,共8页
为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争... 为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争议解决程序的独立性和完整性,但如何保证其实施,则存在多种选择路径。若借助于保密合同,则合同之外的主体难受约束;若借助于排除规则,则与仲裁规则的合同性质相悖;若借助于无损于现状特免权,特免权之外的自然人和法人都将成为特免权的义务主体。因此,以无损于现状特免权为基础,根据调解交流是否与促成调解这一目标有关,可以在提供主体、产生时间和信息类型三个方面有效构建调解交流的保护机制。 展开更多
关键词 调解保密 公平审理 无损于现状特免权
下载PDF
近代日本对鸦片问题的认识及对中国台湾鸦片殖民特权的构建
16
作者 安善花 任永泽 《大连大学学报》 2024年第4期10-16,共7页
继以英国为首的西方殖民列强向中国倾销鸦片,并以坚船利炮促使国门洞开进而催生鸦片问题后,作为后发的帝国主义国家,日本对鸦片战争的经验教训及鸦片本身的认识不断发生变化,一方面为免遭鸦片毒害,通过颁布禁止鸦片进口的法令规避鸦片威... 继以英国为首的西方殖民列强向中国倾销鸦片,并以坚船利炮促使国门洞开进而催生鸦片问题后,作为后发的帝国主义国家,日本对鸦片战争的经验教训及鸦片本身的认识不断发生变化,一方面为免遭鸦片毒害,通过颁布禁止鸦片进口的法令规避鸦片威胁,另一方面又难掩对鸦片利润的贪婪及对扩大资本市场的追逐。日本对鸦片问题这种由“危机”到“获利”的认识转变,促使其于甲午战争后在中国台湾建立鸦片殖民特权,不仅通过聚敛大量财富巩固其殖民统治,而且成为其进一步扩大对中国鸦片侵略的恶例。 展开更多
关键词 日本 鸦片问题 鸦片殖民特权
下载PDF
RISC-V特权架构配置的硬件实现影响研究
17
作者 闫润 黄立波 +3 位作者 成元虎 杨凌 兰孟桥 张京 《小型微型计算机系统》 CSCD 北大核心 2024年第4期1018-1024,共7页
RISC-V指令集的模块化设计,能够适用于从低功耗设备到高性能处理器等多个领域.RISC-V特权架构涵盖了系统中除非特权指令集以外的所有内容,包括特权指令以及运行操作系统和连接外部设备所需的附加功能.基于特权架构,分为32位和64位两类,... RISC-V指令集的模块化设计,能够适用于从低功耗设备到高性能处理器等多个领域.RISC-V特权架构涵盖了系统中除非特权指令集以外的所有内容,包括特权指令以及运行操作系统和连接外部设备所需的附加功能.基于特权架构,分为32位和64位两类,涵盖特权等级、异常处理、物理内存保护、基于页面的虚拟内存和性能计数器等模块的32种配置,探索特权架构配置在不同应用场景下对功能和硬件资源开销的影响.在实现方式上,采用参数化配置来选择系统的特权架构.实验结果表明,根据配置的特权架构不同,在采用相同非特权体系结构的情况下,最多会有28.63%的面积和40.83%的功耗差异. 展开更多
关键词 RISC-V 特权架构 配置性 面积 功耗 微处理器
下载PDF
刑事诉讼近亲属拒证权构建基础与路径研究
18
作者 魏昊然 庄乾龙 《南海法学》 2024年第4期24-33,共10页
刑事诉讼近亲属拒证权作为一项保障人权的法律制度,在我国尚付阙如,蕴含亲属拒证权内核的亲亲相隐制度随着国家本位主义观念的盛行而遭到废除,有碍家庭关系的维系及质证权的全面行使。事实上,该制度于人伦精神之丰富、社会关系之构建、... 刑事诉讼近亲属拒证权作为一项保障人权的法律制度,在我国尚付阙如,蕴含亲属拒证权内核的亲亲相隐制度随着国家本位主义观念的盛行而遭到废除,有碍家庭关系的维系及质证权的全面行使。事实上,该制度于人伦精神之丰富、社会关系之构建、服刑结束人员之关怀都具有重要的价值,近亲属拒证权的构建不仅能够完善我国的人权保障和证人出庭制度,而且可以加快我国人权主流化的进程,回应我国对于刑事诉讼法多元化司法的要求,推动法治国家的建设。究其构建的具体路径,应当注重多种价值的选择与平衡,设立合理的边界以免造成价值失衡,将危害国家安全的犯罪、以危险方法危害公共安全的犯罪、危害公共卫生罪及亲属间的犯罪作为近亲属拒证权的例外情形,以相应机关的告知义务和审查义务为视角完善该制度的适用程序,探究申诉与审查并重的救济途径以保障权利的良好行使。 展开更多
关键词 人权保障 多元化司法 拒证权 拒证权边界
下载PDF
云计算中属性基数据与权限混合访问控制方案
19
作者 刘芹 李鹏举 余纯武 《计算机工程与应用》 CSCD 北大核心 2024年第13期276-286,共11页
云计算的出现使得从任何位置访问应用程序和数据成为可能,由于其灵活、高效和资源共享的特性,云计算迅速应用于各个行业和领域。云计算中的安全细粒度数据访问控制、隐私保护和权限控制已成为学术界和工业界研究的热点问题。为了解决这... 云计算的出现使得从任何位置访问应用程序和数据成为可能,由于其灵活、高效和资源共享的特性,云计算迅速应用于各个行业和领域。云计算中的安全细粒度数据访问控制、隐私保护和权限控制已成为学术界和工业界研究的热点问题。为了解决这些问题,提出一种基于SM9属性加密的数据与权限混合访问控制方案,在需要加密大量具有层次结构的数据的场景下,该方案比传统的属性基加密方案更加灵活高效,匿名的特点可以限制用户隐私泄露,层次权限控制使得更细粒度地管理云数据的操作权限成为可能。安全分析和实验结果表明,该方案在判定性双线性Diffie-Hellman假设下是安全的,在加解密等方面具有良好的工作效率。 展开更多
关键词 匿名 层次数据 权限控制 SM9 属性基加密
下载PDF
寒门子弟的高等教育经历研究——寒门幸运儿和双重贫困生的异质性视角
20
作者 孙冉 史俊云 杜屏 《教育与经济》 北大核心 2024年第3期58-68,共11页
寒门子弟的高等教育经历表现话题长期存在二元对立的观点。本研究追溯高中教育经历,并分析其与高等教育环境间的连续性,丰富寒门背景对大学生综合表现的影响机制,以示范性普通高中机会获得将寒门子弟区分为寒门幸运儿和双重贫困生两类群... 寒门子弟的高等教育经历表现话题长期存在二元对立的观点。本研究追溯高中教育经历,并分析其与高等教育环境间的连续性,丰富寒门背景对大学生综合表现的影响机制,以示范性普通高中机会获得将寒门子弟区分为寒门幸运儿和双重贫困生两类群体,同时与非寒门子弟在大学期间的学业成就、人际交往和毕业预期去向等高等教育经历方面进行全面比较。结果显示,寒门幸运儿和双重贫困生的学业成绩排名均显著优于非寒门大学生;寒门幸运儿有着不亚于非寒门大学生的人际交往表现,能尽快适应融入高校生活,而双重贫困生对人际交往更可能感到不适应,人际交往能力水平也更低;寒门幸运儿与非寒门大学生的毕业规划类似,即毕业后更可能继续深造,而双重贫困生则更可能直接就业。本研究的结论验证了寒门大学生内部的异质性,并肯定了通过家庭之外的文化资本补偿对寒门子弟突破家庭资本劣势的重要意义。 展开更多
关键词 寒门子弟 寒门幸运儿 双重贫困生 学生发展 高等教育
下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部