期刊文献+
共找到1,432篇文章
< 1 2 72 >
每页显示 20 50 100
The Privilege of the Medieval Universitiesfrom the Perspective of Game Theory
1
作者 李海莉 徐朋辉 《石家庄经济学院学报》 2016年第3期104-107,共4页
在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免... 在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免役权以及独立颁发教学许可证等特权,诸多的特权为大学的未来发展壮大奠定了坚实的基础,至今仍产生深远影响. 展开更多
关键词 博弈 中世纪 大学 特权
下载PDF
Effect of Vasocation Intestinal Peptide on Immune Privilege of the Rat Testis 被引量:1
2
作者 Wei WANG Ye-bin XI Guang-jie CHEN Jing HAO Bao-guo WANG Tian-wei SHEN Li-hua JIANG Wei-yi LI 《Journal of Reproduction and Contraception》 CAS 2008年第1期1-8,共8页
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex... Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells. 展开更多
关键词 vasocation intestinal peptide (VIP) Leydig cell FASL TFG-β immune privilege
下载PDF
Farmers' Privilege under the Protection of New Plant Varieties
3
作者 YANG De-xing Department of Human Sciences,Suzhou Polytechnic Institute of Agriculture,Suzhou 215008,China 《Asian Agricultural Research》 2012年第7期86-88,共3页
This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analy... This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analyzes shortcomings of farmers'privilege regulations,and puts forward that it is required to improve farmers'privilege regulations in subjects,objects and contents of rights on the basis of learning from advanced legislation experience of foreign countries,and build the interest sharing mechanism between breeders and farmers. 展开更多
关键词 PROTECTION of NEW PLANT VARIETIES Farmers’privileg
下载PDF
Discussion on the privilege system in the laws of the Ming Dynasty
4
作者 Chert Kai 《International English Education Research》 2014年第12期41-42,共2页
An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the fo... An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the former Yuan Dynasty could not suit the demands of the development of the new situations, so he developed the new statutes. The laws of the Ming Dynasty absorbed the lessons that the Yuan government law and discipline ceased to be binding or become lax, and put forward that the laws must be strict, and abolished the system of the prime minister, showing a high degree of centralization. The laws of the Ming Dynasty had the important influence on the political thoughts in the late feudal society, so the researches on the legal systems in the Ming dynasty have practical significance. This paper briefly expounds the legal privileges of the Ming Dynasty for reference. 展开更多
关键词 Law of the Ming Dynasty system of privilege CENTRALIZATION
下载PDF
Genius Is Not a Privilege of the Few
5
作者 LI CHAOCHEN and HOU RUILI 《China Today》 1996年第10期28-29,共2页
GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYw... GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYwordsoutof35givent... 展开更多
关键词 Genius Is Not a privilege of the Few
下载PDF
Stricter national standards are required for credentialing of endoscopic-retrograde-cholangiopan-creatography in the United States 被引量:9
6
作者 Mitchell S Cappell David M Friedel 《World Journal of Gastroenterology》 SCIE CAS 2019年第27期3468-3483,共16页
Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly stee... Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine. 展开更多
关键词 Endoscopic retrograde CHOLANGIOPANCREATOGRAPHY privileges CREDENTIALING Gastroenterology FELLOWSHIP TRAINING Advanced gastrointestinal endoscopy TRAINING Certification Standards
下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
7
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
下载PDF
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel 被引量:2
8
作者 ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China 2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期137-141,共5页
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi... A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost. 展开更多
关键词 Key words intrusion detection privilege flow model HSMM
下载PDF
Fas ligand expression in colon cancer:A possible mechanism of tumor immune privilege 被引量:6
9
作者 WeiZhang Er-XunDing +4 位作者 QiangWang Da-QiaoZhu JinHe Yu-LiLi Yuan-HeWang 《World Journal of Gastroenterology》 SCIE CAS CSCD 2005年第23期3632-3635,共4页
AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninet... AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes. 展开更多
关键词 Fas ligand Colon cancer Immune privilege
下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
10
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
The effect of FasL gene transfer to islet cells on pancreatic islet allografts
11
作者 Shi-Rong Cai Yu-Long He +3 位作者 Mei-Jin Huang Jun-Sheng Peng Jian-Ping Wang Wen-Hua Zhan the Department of Gastrointestinal and Pancreatic Surgery, First Affiliated Hospital, Sun Yat-Sen University, Guangzhou 510080, China 《Hepatobiliary & Pancreatic Diseases International》 SCIE CAS 2003年第2期624-628,共5页
OBJECTIVE: To investigate the effect of FasL gene transfer to islet cells on pancreatic islet allografts. METHODS: A recombinant and replication-deficient type-5 adenovirus encoding murine FasL (AdV- FasL) was constru... OBJECTIVE: To investigate the effect of FasL gene transfer to islet cells on pancreatic islet allografts. METHODS: A recombinant and replication-deficient type-5 adenovirus encoding murine FasL (AdV- FasL) was constructed by the method of calcium phosphate precipitation. Pancreatic islets were infected with the recombinant adenovirus AdV-FasL, and transplanted into diabetic recipients. FasL expression was detected by RT-PCR and immunohistochemistry. The survival of allografts and the apoptosis of gene transferred islet allografts were analyzed. RESULTS: All animals receiving islet allograft alone returned to a diabetic state by several days (mean survival time 6.3±0.6 days). Compared with the control group, no delayed rejection and prolonged survival of allografts were observed in the group of FasL gene transfer. The rejection was accelerated and the allograft survival was shortened to 3.4±0.2 days (P<0.05). Pancreatic islets infected with AdV- FasL demonstrated positive staining of FasL at 24 h, with an increased intensity at 48 h, but not in AdV-5 infected or uninfected islets. TUNEL labeling of pancreatic islet allografts at 24, 48 h revealed apoptosis that was not in AdV-5 infected allografts. CONCLUSIONS: Though co-transplantation of FasL-expressing testicular cells can induce privilege of islet allografts and prolong allograft survival, direct expression of FasL on islet allografts infected with AdV-FasL may accelerate islets rejection by islet apoptosis and granulocyte infiltration. 展开更多
关键词 islet/transplantation Fas ligand immune privilege gene therapy
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
12
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI privilege management infrastructure)
下载PDF
Use and Abuse of Privileged Information in Italian Listed Companies
13
作者 Annalisa Baldissera 《Chinese Business Review》 2019年第1期14-29,共16页
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ... Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements. 展开更多
关键词 privileged INFORMATION FINANCIAL statements LISTED COMPANIES
下载PDF
Identity Governance Framework for Privileged Users
14
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
下载PDF
Obligation-based Theory vs.Right-based Theory:Confrontation of Ideas Between Warrender and Strauss
15
作者 唐学亮 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1134-1150,共17页
There is a transition from the objective laws or moral orders that precede human will in classical natural law to the subjective demands or rights emanating from human will in modern natural law,and it represents a hi... There is a transition from the objective laws or moral orders that precede human will in classical natural law to the subjective demands or rights emanating from human will in modern natural law,and it represents a historical debate on the shift from an obligation-based theory to a right-based theory.Strauss,within the context of this transition across time,assesses Thomas Hobbes's philosophy of law and recognizes him as the founder of modern natural rights theory.Using Wesley Newcomb Hohfeld's analysis of jurisprudence,Howard Warrender assesses the privilege nature of Hobbes's concept of natural rights and concludes that,since Hohfeld's privilege is the opposite of obligation and related to no-right,obligations cannot be derived from natural rights.Therefore,Warrender argues that Strauss's assertion requires correction.However,Warrender places excessive emphasis on Hohfeld's static separation of the concept of privilege within his theoretical system,overlooking the dynamic transformation from privilege to claim rights.In this regard,Hobbesian scholar Carlan's criticism of Warrender is valid.Meanwhile,Warrender's research holds theoretical significance in that he,under the premise of being a part of Hobbes'natural law tradition,transforms Hohfeld's flat,two-party legal rights relationships into a three-party legal rights structure,which could represent a potential innovation in the 20^(th)century legal philosophy. 展开更多
关键词 OBLIGATION nature rights privilege Warrender Strauss
下载PDF
Comparing of the Passing Experience of Clare in Quicksand and Passing and Birdie in Caucasia
16
作者 张子婵 《海外英语》 2018年第17期178-179,共2页
This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white... This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful. 展开更多
关键词 privileged IDENTITY QUICKSAND and PASSING Caucasia
下载PDF
恢复原始设定的Re-pair Privileges Utility 1.0
17
《电子与金系列工程信息》 2002年第7期9-9,共1页
关键词 苹果公司 REPAIR privileges Utility1.0 系统需求 警告讯息
下载PDF
Chinese-Language Software-A Privilege for Chinese
18
作者 YANG TAOYUAN 《China Today》 1994年第10期61-62,共2页
Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chin... Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long. 展开更多
关键词 Chinese-Language Software-A privilege for Chinese
下载PDF
“调解不成无损于现状”机制的功能与法理基础
19
作者 宋连斌 武振国 周健 《东北大学学报(社会科学版)》 CSSCI 北大核心 2024年第1期100-107,共8页
为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争... 为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争议解决程序的独立性和完整性,但如何保证其实施,则存在多种选择路径。若借助于保密合同,则合同之外的主体难受约束;若借助于排除规则,则与仲裁规则的合同性质相悖;若借助于无损于现状特免权,特免权之外的自然人和法人都将成为特免权的义务主体。因此,以无损于现状特免权为基础,根据调解交流是否与促成调解这一目标有关,可以在提供主体、产生时间和信息类型三个方面有效构建调解交流的保护机制。 展开更多
关键词 调解保密 公平审理 无损于现状特免权
下载PDF
近代日本对鸦片问题的认识及对中国台湾鸦片殖民特权的构建
20
作者 安善花 任永泽 《大连大学学报》 2024年第4期10-16,共7页
继以英国为首的西方殖民列强向中国倾销鸦片,并以坚船利炮促使国门洞开进而催生鸦片问题后,作为后发的帝国主义国家,日本对鸦片战争的经验教训及鸦片本身的认识不断发生变化,一方面为免遭鸦片毒害,通过颁布禁止鸦片进口的法令规避鸦片威... 继以英国为首的西方殖民列强向中国倾销鸦片,并以坚船利炮促使国门洞开进而催生鸦片问题后,作为后发的帝国主义国家,日本对鸦片战争的经验教训及鸦片本身的认识不断发生变化,一方面为免遭鸦片毒害,通过颁布禁止鸦片进口的法令规避鸦片威胁,另一方面又难掩对鸦片利润的贪婪及对扩大资本市场的追逐。日本对鸦片问题这种由“危机”到“获利”的认识转变,促使其于甲午战争后在中国台湾建立鸦片殖民特权,不仅通过聚敛大量财富巩固其殖民统治,而且成为其进一步扩大对中国鸦片侵略的恶例。 展开更多
关键词 日本 鸦片问题 鸦片殖民特权
下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部