The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,su...The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.展开更多
Mongolian Terms Commonly Used in Meteorological Services that was issued by the China Meteorological Administration is China s first traditional Mongolian standard in meteorological industry. In the process of formula...Mongolian Terms Commonly Used in Meteorological Services that was issued by the China Meteorological Administration is China s first traditional Mongolian standard in meteorological industry. In the process of formulation, the compilation unit fully complied with the principles of scientificity, practicability, universality and versatility, and used literal translation, free translation, and the combination of literal translation and free translation to translate and compile 71 mongolian terms commonly used in meteorological services. The standard fills the blank of standardization construction of basic traditional Mongolian language in the meteorological industry of China.展开更多
The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. Th...The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified.展开更多
There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one...There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and展开更多
In the context that global grain security is still in very severe situation,the grain security situation in China is not optimistic as well. The " Red Line of Farmland Area" cannot completely solve the grain...In the context that global grain security is still in very severe situation,the grain security situation in China is not optimistic as well. The " Red Line of Farmland Area" cannot completely solve the grain security problems in China. We still need to seek new breakthroughs in the quality and yield of farmland. The construction of high standard capital farmland is the important premise to guarantee national grain security. On this basis,this paper has summarized the difficulties we are facing in the construction of high standard capital farmland,and has proposed the methods and measures to construct high standard capital farmland and lay a solid foundation for grain security in China.展开更多
The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algo...The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security.展开更多
To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian prin...To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian principle, explores the existence of multiple routes and forces packets to take alternate paths probabilistically. In this paper, we investigate game theoretic techniques to develop routing policies which make interception and eavesdropping maximally difficult. Through simulations, we validate our theoretical results and show how the resulting routing algorithms perform in terms of the security/delay/drop-rate, and we contrast them with the mechanism, secure stochastic routing (SSR). We observed that our scheme makes routing more secure than traditional secure stochastic routing, as they make use of the information of detecting the other side’s behavior.展开更多
February 7,Brussels,Belgium&virtual The European Standardization Organizations CEN,CENELEC and ETSI,are pleased to join forces with ENISA,the EU Agency for Cybersecurity,to organize the 7th Cybersecurity Standardi...February 7,Brussels,Belgium&virtual The European Standardization Organizations CEN,CENELEC and ETSI,are pleased to join forces with ENISA,the EU Agency for Cybersecurity,to organize the 7th Cybersecurity Standardization Conference"European Standardization in support of the EU Legislation".The 2023 programme of this well-recognized conference will have dedicated sessions on standardization activities in the areas related to the emerging EU legislation:proposed Cyber Resilience Act.展开更多
This paper seeks to contribute to the discussion on the future mandatory application of Intemational Financial Reporting Standards (IFRS) using data from a questionnaire-based survey administered to financial statem...This paper seeks to contribute to the discussion on the future mandatory application of Intemational Financial Reporting Standards (IFRS) using data from a questionnaire-based survey administered to financial statement preparers, that is, management in Japan. The important findings of this paper are as follows. The majority of Japanese companies consider that the domestic markets are more important than overseas markets; the most important differences between IFRS and Japanese standards are goodwill, comprehensive income, and the recognition of revenue; it is expected that IFRS would be applied only in consolidated financial statements or in both consolidated and parent companies' separate financial statements; and the lack of legislation making it mandatory is the main reason why IFRS has not been adopted by Japanese companies. Overall, this paper found that Japanese management is prudent and passive regarding IFRS adoption, leaving room for further discussions on the future mandatory application of IFRS in Japan.展开更多
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
In a moral sense,there is an essential di erence between“disciplining oneself”and“disciplining others”in that the former means one setting rules for and giving orders to oneself in regard to one’s own conduct,whi...In a moral sense,there is an essential di erence between“disciplining oneself”and“disciplining others”in that the former means one setting rules for and giving orders to oneself in regard to one’s own conduct,which are unconditionally compulsory,while the latter is exible in the sense that one’s rules and orders for oneself are not compulsory to others and cannot prohibit others from doing something.In principle,Confucius’s sayings,“do not impose upon others that which you would not wish for yourself”and“establish others in seeking to establish yourself and promote others in s eeking to promote yourself”have epitomized the line of demarcation between them.His doctrine of“not imposing upon others that which you would not wish for yourself,”though based on self-preservation and self-interest,represents a standard of conduct of highly universal value.If the overwhelming majority of a society follows it as their standard of conduct,refraining from harming others in order to protect oneself from harm,then the whole society will endure little,if not no,strife and struggle.展开更多
International solidarity is a fundamental value upheld by the united nations as well as a principle of international law recognized by independent experts on human rights The values and principle of international soli...International solidarity is a fundamental value upheld by the united nations as well as a principle of international law recognized by independent experts on human rights The values and principle of international solidarity have played an important role in promoting human rights, improving the international economic order, driving sustainable development, and tackling global challenges, and they have gained wide support from most developing countries As unilateralism and protectionism continue to spread, global governance and multilateral cooperation are under threat Against this background, the united nations calls for the spirit and principle of international solidarity and the promotion of solidarity rights, including the right to development, and encourages the countries to safeguard global public health through joint actions and to avoid discrimination The concept of a community with a shared future for human beings proposed by China embodies international cooperation, mutual learning and exchanges, and collective efforts to promote and safeguard human rights It has made a positive contribution to enriching and boosting the principle of international solidarity and demonstrated the wisdom and responsibility of China as a major country.展开更多
The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cyber...The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.展开更多
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT...With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security [1]. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.展开更多
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum servic...Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.展开更多
After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end pro...After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems.展开更多
文摘The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.
文摘Mongolian Terms Commonly Used in Meteorological Services that was issued by the China Meteorological Administration is China s first traditional Mongolian standard in meteorological industry. In the process of formulation, the compilation unit fully complied with the principles of scientificity, practicability, universality and versatility, and used literal translation, free translation, and the combination of literal translation and free translation to translate and compile 71 mongolian terms commonly used in meteorological services. The standard fills the blank of standardization construction of basic traditional Mongolian language in the meteorological industry of China.
文摘The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified.
文摘There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and
基金Supported by Soft Science Project of Anhui Provincial Department of Land and Natural Resources(2015801)
文摘In the context that global grain security is still in very severe situation,the grain security situation in China is not optimistic as well. The " Red Line of Farmland Area" cannot completely solve the grain security problems in China. We still need to seek new breakthroughs in the quality and yield of farmland. The construction of high standard capital farmland is the important premise to guarantee national grain security. On this basis,this paper has summarized the difficulties we are facing in the construction of high standard capital farmland,and has proposed the methods and measures to construct high standard capital farmland and lay a solid foundation for grain security in China.
基金Supported by the National Natural Science Foun-dation of China (60273014)
文摘The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security.
基金the initial results of the general project of the National Social Science Foundation in 2016“A study on the Reconstruction of International Anti-tax avoidance rules of Cross-border intangible assets transfer pricing in the Digital economy”(16BFX 165A)the Youth Program of philosophy and Social Sciences of Anhui Province in 2014“Research on the Establishment and system Construction of the right of tax Supervision in China”(AHSKQ2014D01)
文摘To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian principle, explores the existence of multiple routes and forces packets to take alternate paths probabilistically. In this paper, we investigate game theoretic techniques to develop routing policies which make interception and eavesdropping maximally difficult. Through simulations, we validate our theoretical results and show how the resulting routing algorithms perform in terms of the security/delay/drop-rate, and we contrast them with the mechanism, secure stochastic routing (SSR). We observed that our scheme makes routing more secure than traditional secure stochastic routing, as they make use of the information of detecting the other side’s behavior.
文摘February 7,Brussels,Belgium&virtual The European Standardization Organizations CEN,CENELEC and ETSI,are pleased to join forces with ENISA,the EU Agency for Cybersecurity,to organize the 7th Cybersecurity Standardization Conference"European Standardization in support of the EU Legislation".The 2023 programme of this well-recognized conference will have dedicated sessions on standardization activities in the areas related to the emerging EU legislation:proposed Cyber Resilience Act.
基金Hu and Yao would like to thank Chitoshi Koga (Doshisha University), Norio Igarashi (Yokohama National University), and Hajime Yasui (director of Aarata Institute, PwC Japan) for assisting in the data collection of this study. Hu thanks the funding support from Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Number 24730385, JSPS Strategic Young Researcher Overseas Visits Program Number J2302, and Nitto Promotion of Science Foundation.
文摘This paper seeks to contribute to the discussion on the future mandatory application of Intemational Financial Reporting Standards (IFRS) using data from a questionnaire-based survey administered to financial statement preparers, that is, management in Japan. The important findings of this paper are as follows. The majority of Japanese companies consider that the domestic markets are more important than overseas markets; the most important differences between IFRS and Japanese standards are goodwill, comprehensive income, and the recognition of revenue; it is expected that IFRS would be applied only in consolidated financial statements or in both consolidated and parent companies' separate financial statements; and the lack of legislation making it mandatory is the main reason why IFRS has not been adopted by Japanese companies. Overall, this paper found that Japanese management is prudent and passive regarding IFRS adoption, leaving room for further discussions on the future mandatory application of IFRS in Japan.
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.
文摘In a moral sense,there is an essential di erence between“disciplining oneself”and“disciplining others”in that the former means one setting rules for and giving orders to oneself in regard to one’s own conduct,which are unconditionally compulsory,while the latter is exible in the sense that one’s rules and orders for oneself are not compulsory to others and cannot prohibit others from doing something.In principle,Confucius’s sayings,“do not impose upon others that which you would not wish for yourself”and“establish others in seeking to establish yourself and promote others in s eeking to promote yourself”have epitomized the line of demarcation between them.His doctrine of“not imposing upon others that which you would not wish for yourself,”though based on self-preservation and self-interest,represents a standard of conduct of highly universal value.If the overwhelming majority of a society follows it as their standard of conduct,refraining from harming others in order to protect oneself from harm,then the whole society will endure little,if not no,strife and struggle.
文摘International solidarity is a fundamental value upheld by the united nations as well as a principle of international law recognized by independent experts on human rights The values and principle of international solidarity have played an important role in promoting human rights, improving the international economic order, driving sustainable development, and tackling global challenges, and they have gained wide support from most developing countries As unilateralism and protectionism continue to spread, global governance and multilateral cooperation are under threat Against this background, the united nations calls for the spirit and principle of international solidarity and the promotion of solidarity rights, including the right to development, and encourages the countries to safeguard global public health through joint actions and to avoid discrimination The concept of a community with a shared future for human beings proposed by China embodies international cooperation, mutual learning and exchanges, and collective efforts to promote and safeguard human rights It has made a positive contribution to enriching and boosting the principle of international solidarity and demonstrated the wisdom and responsibility of China as a major country.
文摘The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.
文摘With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security [1]. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.
文摘Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.
文摘After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems.