期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party 被引量:1
1
作者 昌燕 许春香 +5 位作者 张仕斌 王海春 闫丽丽 韩贵华 黄源源 盛志伟 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期1-5,共5页
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third... In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack. 展开更多
关键词 of in it or IS on Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest third party TP with
下载PDF
A Positive Analysis for BPR of the Third Party Logistics
2
作者 LI Yan-feng 1, WU Xiao-song 2 (1. Management School, Huazhong University of Science and Technology, Wuhan 430074, China 2. Information Management School, Yunnan University of Finance and Trade, Kunming 650221, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期231-232,共2页
Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require m... Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers. 展开更多
关键词 third party logistics management technique info rmation technique business model
下载PDF
Customized Share Level Monitoring System for Users in OSN-Third Party Applications
3
作者 T.Shanmuigapriya S.Swamynathan Thiruvaazhi Uloli 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1327-1339,共13页
Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networ... Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user. 展开更多
关键词 Online social networks third party applications PRIVACY gaussian mixture model fuzzy inference
下载PDF
An Exploration of the Influences of a Third Party on Chinese College Students’Speech Act of Disagreement
4
作者 刘颖 《海外英语》 2021年第12期105-107,共3页
Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to ... Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings. 展开更多
关键词 disagreement strategies a third party speech act theory Chinese settings
下载PDF
“Fundamental Rights and Private Law” in China
5
作者 奚若晨 张翔 LIU Zhao 《The Journal of Human Rights》 2023年第1期109-133,共25页
The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitut... The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory. 展开更多
关键词 the effect against a third party the case of Qi Yuling the judicial enforcement of the Constitution Civil Code constitutionalization of private law
下载PDF
第三方电子商务的个性化信息推荐系统 被引量:3
6
作者 郑华 彭欣 《计算机工程与设计》 CSCD 北大核心 2009年第12期2981-2984,共4页
在分析已有成果的基础上,设计了一个面向第三方电子商务的个性化信息推荐系统,并详细阐述了该系统的体系结构、功能划分以及关键技术。该系统通过追踪用户的阅读行为、分析用户的喜好,进而学习用户的兴趣和行为,实现了主动向用户推荐个... 在分析已有成果的基础上,设计了一个面向第三方电子商务的个性化信息推荐系统,并详细阐述了该系统的体系结构、功能划分以及关键技术。该系统通过追踪用户的阅读行为、分析用户的喜好,进而学习用户的兴趣和行为,实现了主动向用户推荐个性化信息、个性化评比、个性化主题分类及版面配置的功能。实验结果表明,该个性化信息推荐系统具有较好的性能。 展开更多
关键词 个性化 第三方电子商务 推荐 客户端/服务器 JAVA
下载PDF
Comparable anti-CMV responses of transplant donor and third-party CMV-specific T cells for treatment of CMV infection after allogeneic stem cell transplantation 被引量:4
7
作者 Xu-Ying Pei Xue-Fei Liu +11 位作者 Xiang-Yu Zhao Meng Lv Xiao-Dong Mo Ying-Jun Chang Qian-Nan Shang Yu-Qian Sun Yu-Hong Chen Lan-Ping Xu Yu Wang Xiao-Hui Zhang Kai-Yan Liu Xiao-Jun Huang 《Cellular & Molecular Immunology》 SCIE CAS CSCD 2022年第4期482-491,共10页
Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell tran... Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity. 展开更多
关键词 Allogeneic stem cell transplantation CMV-specific cytotoxic T lymphocytes Transplant donor third party donor IMMUNOTHERAPY
原文传递
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:3
8
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm ENCRYPTION efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States 被引量:1
9
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 Quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
下载PDF
The Role of Third-Party Participation in Urban Planning: A Case Study on the Enning Road Neighborhood Renovation Project in Guangzhou 被引量:1
10
作者 Zuquan WU De WANG +1 位作者 Chasong ZHU Qingfei ZHANG 《China City Planning Review》 2014年第3期48-57,共10页
Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in Chin... Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public. 展开更多
关键词 third party urban planning public participation Enning Road Neighborhood
原文传递
Geo-Spatial Analysis of Oil Spill Distribution and Susceptibility in the Niger Delta Region of Nigeria 被引量:1
11
作者 Shittu Whanda Olalekan Adekola +2 位作者 Bashir Adamu Sani Yahaya Prem C. Pandey 《Journal of Geographic Information System》 2016年第4期438-456,共20页
Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producin... Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies. 展开更多
关键词 Oil Spills GIS Analysis third party Damage Interdiction Pollutant Linkages
下载PDF
Quantum Electronic Contract Scheme Based on Single Photon
12
作者 Tian Cao Yan Chang +2 位作者 Lili Yan Shibin Zhang Qirun Wang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1507-1517,共11页
An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electron... An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy. 展开更多
关键词 E-contract quantum cryptography single photon trusted third party
下载PDF
Understanding Trust Transfer in Construction Project Marketplace of China
13
作者 Chen Menglong Yin Yinlin 《Journal of Civil Engineering and Architecture》 2022年第11期541-556,共16页
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the... Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project. 展开更多
关键词 Trust transfer trustor the third party TRUSTEE construction project
下载PDF
Research on the Mode of Efficaciously Solving “Agricultural Super-Docking” Development Difficulties in China
14
作者 Guangshu Xu Haifang Zhang Xuewen Zhang 《World Journal of Engineering and Technology》 2016年第3期460-468,共9页
Constructing circulation mode of high feasibility and good implementation effect is the key method to solve difficulties in the development of “Agricultural Super-Docking” at present in China. There are many problem... Constructing circulation mode of high feasibility and good implementation effect is the key method to solve difficulties in the development of “Agricultural Super-Docking” at present in China. There are many problems that exist in the process of the development of “Agricultural Super-Docking” by our analyzing from both the benefit of subjects and the whole supply chain perspectives. A large amount of relevant literature research shows that adopting the “cooperation between the government and the third party logistics enterprises to build distribution center” innovation model can solve these problems. This model can effectively remove obstacles between farmers and supermarkets. It is conducive to the development of small and medium-scale the farmer cooperatives, supermarkets and the third party logistics enterprises that don’t have a strong financial strength and a high degree of brand influence. In addition, it can also produce considerable social benefits. In order to ensure the implementation efficiency of the model to maximize, some management issues in the implementation process about the determination of core subject in supply chain, the method of evaluating the third party logistics enterprises grade, the planning of the number of customers for the distribution center, the mechanism of income distribution among multiple subjects and the implementation of relevant policies after the model into practice should be taken into account. 展开更多
关键词 Agricultural Super-Docking Distribution Center The Government and the third party Logistics Enterprises Quality and Safety
下载PDF
The Relationship Between Maintenance and Personnel Management In Industrial Companies
15
作者 Zhao Songzheng School of Management Northwestern Polytechnical University Xi’an, 710072, P.R.ChinaK. Smit Faculty of Aerospace Engineering Delft University of Technology Kluyverweg1, 2629 HS Delft, 《International Journal of Plant Engineering and Management》 1996年第1期10-14,共5页
The Netherlands With the rapid development of computers and Management Information Systems(MIS), increasing number of factories have paid more attention to developing MIS, including provision for maintenance. But mai... The Netherlands With the rapid development of computers and Management Information Systems(MIS), increasing number of factories have paid more attention to developing MIS, including provision for maintenance. But maintenance systems in many organizations have been developed in a piecemeal fashion and often in isolation from other management systems . This paper describes the main relationship between maintenance and one of the maintenance resourcesPersonal. 展开更多
关键词 PERSONNEL Own Labor third party Gross Available Capacity Nett Available Personnel Capacity.
下载PDF
ETP-AKEP: enhanced three-party authenticated key exchange protocols for data integrity in cloud environments
16
作者 Kalluri Rama Krishna C.V.Guru Rao 《Journal of Control and Decision》 EI 2023年第1期126-133,共8页
With key exchange protocols, a secure session key is generated between two remote users, andservers and exchanged between them. It is generally used to prevent unauthorised users fromgaining access to sensitive data. ... With key exchange protocols, a secure session key is generated between two remote users, andservers and exchanged between them. It is generally used to prevent unauthorised users fromgaining access to sensitive data. This article presents an enhanced three-party authenticated keyexchange protocols (ETP-AKE) protocol that does not depend on symmetric key encryption andinstead uses asymmetric key encryption. A key component of the proposed ETP-AKE protocol isusing elliptic curve encryption in conjunction with a one-way hash function. Its integrity certificationwas confirmed via the usage of the AVISPA tool package. Our proposed protocol is intendedto protect against various security threats, including the man-in-the-middle assault, the parallelattack, and the key-compromise attack, among others. 展开更多
关键词 ECC hash function cloud integrity third party key exchange
原文传递
A Random Anonymity Framework for Location Privacy 被引量:1
17
作者 YANG Songtao YIN Guisheng MA Chunguang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期521-529,共9页
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i... Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks. 展开更多
关键词 data privacy location-based services(LBS) trusted third party K-ANONYMITY
原文传递
Understanding satellite images:a data mining module for Sentinel images
18
作者 Corneliu Octavian Dumitru Gottfried Schwarz +4 位作者 Anna Pulak-Siwiec Bartosz Kulawik Mohanad Albughdadi Jose Lorenzo Mihai Datcu 《Big Earth Data》 EI 2020年第4期367-408,共42页
The increased number of free and open Sentinel satellite images has led to new applications of these data.Among them is the systematic classification of land cover/use types based on patterns of settlements or agricul... The increased number of free and open Sentinel satellite images has led to new applications of these data.Among them is the systematic classification of land cover/use types based on patterns of settlements or agriculture recorded by these images,in particular,the identification and quantification of their temporal changes.In this paper,we will present guidelines and practical examples of how to obtain rapid and reliable image patch labelling results and their validation based on data mining techniques for detecting these temporal changes,and presenting these as classification maps and/or statistical analytics.This represents a new systematic validation approach for semantic image content verification.We will focus on a number of different scenarios proposed by the user community using Sentinel data.From a large number of potential use cases,we selected three main cases,namely forest monitoring,flood monitoring,and macro-economics/urban monitoring. 展开更多
关键词 Data mining Earth observation Sentinel-1 Sentinel-2 image semantics classification maps ANALYTICS third party mission data
原文传递
Chinese Conflict Management in Libya, Syria and Yemen after the Arab Uprisings
19
作者 Guy Burton 《Asian Journal of Middle Eastern and Islamic Studies》 2019年第1期18-34,I0002,共18页
What has been China’s approach to conflict management in the Middle East?The article begins with a review of Chinese responses to conflict,its wariness at intervention and the emergence of a new model of third-party ... What has been China’s approach to conflict management in the Middle East?The article begins with a review of Chinese responses to conflict,its wariness at intervention and the emergence of a new model of third-party intervention labelled‘quasimediation’.The article then examines three cases of conflict in the region since 2011 and China’s engagement with them:in Libya,Syria and Yemen.While quasi-mediation is not the principal form of Chinese behavior in each case,several common themes are present.They include Chinese wariness at the initial protests;rhetorical appeals for political dialogue between government and opposition and national unity;deference to powerful external actors with interests in the conflict-affected state;and a willingness to pursue commercial opportunities,which advantage some actors and marginalize others.The article therefore suggests that China is not currently making use of quasi-mediation in the Middle East,but that cross-regional comparative studies may reveal if it is occurring elsewhere. 展开更多
关键词 China CONFLICT MEDIATION Middle East third party intervention
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部