期刊文献+
共找到814篇文章
< 1 2 41 >
每页显示 20 50 100
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android
1
作者 Thien-Phuc Doan Ngoc-Tu Chau +1 位作者 Jungsoo Park Souhwan Jung 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3059-3073,共15页
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s... Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security. 展开更多
关键词 Mobile security trusted execution model virtualized trusted execution environment HYPERVISOR
下载PDF
Structural equation modeling analysis of factors influencing architects' trust in project design teams 被引量:1
2
作者 丁志坤 NG Fung-fai 《Journal of Chongqing University》 CAS 2009年第1期32-36,共5页
This paper describes a structural equation modeling (SEM) analysis of factors influencing architects' trust in project design teams. We undertook a survey of architects, during which we distributed 193 questionnair... This paper describes a structural equation modeling (SEM) analysis of factors influencing architects' trust in project design teams. We undertook a survey of architects, during which we distributed 193 questionnaires in 29 A-level architectural design institutes selected radomly from the altogether 59 ones in Shenzhen, P. R. China, and received 130 valid questionnaires. We used Amos 6.0 for SEM to identify significant personal construct based factors affecting interpersonal trust. The results show that only social interaction between architects significantly affects their interpersonal trust. The explained variance of trus~ is not very high in the model. Therefore, future research should add more factors into the current model. The practical implication is that team managers should promote the social interactions between team members such that the interpersonal trust level between team members can be improved. 展开更多
关键词 architect trust project design team cluster sampling structural equation modeling
下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
3
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
下载PDF
Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing 被引量:2
4
作者 HUANG Qiang SHEN Changxiang FANG Yanxiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期13-16,共4页
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM... With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 展开更多
关键词 trusted computing virtual machine monitor(VMM) separation kernel trusted computing base (TCB)
下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
5
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM trusted platform module) trusted virtualization configuration representation configuration management
下载PDF
TVIDS: Trusted Virtual IDS With SGX
6
作者 Juan Wang Shirong Hao +5 位作者 Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang 《China Communications》 SCIE CSCD 2019年第10期133-150,共18页
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reducing equipment costs and operational cost. However, virtual intrusion detection systems (VIDS) face more serious security threats due to running in a shared and virtualized environment instead of proprietary devices. Cloud service providers or malicious tenants may illegally access and tamper with the policies, packet information, and internal processing states of intrusion detection systems, thereby violating the privacy and security of tenant’s networks. To address these challenges, we use Intel Software Guard Extensions (SGX) to build a Trusted Virtual Intrusion Detection System (TVIDS). For TVIDS, to prevent cloud service providers from accessing sensitive information about the users’ network, we build a trusted execution environment for security policy, packets processing, and internal state so that cloud service providers and other malicious tenants can’t access the protected code, policy, processing states, and packets information of the intrusion detection system. We implemented TVIDS on the basis of the Snort which is a famous open-source IDS and evaluated its results on real SGX hardware.The results show that our method can protect the security of the virtual IDS and brings acceptable performance overhead. 展开更多
关键词 network function virtualIZATION INTRUSION detection system SGX trustED EXECUTION environment
下载PDF
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology 被引量:2
7
作者 CHEN Lu ZHANG Huanguo +2 位作者 ZHANG Liqiang LI Song CAI Liang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期523-527,共5页
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. 展开更多
关键词 resource sharing trusted computing virtualIZATION UCON (usage control) chain of trust
下载PDF
Trust Management in Grid-Trust Assessment and Trust Degree Calculation of a Resource—A Novel Approach
8
作者 Avula Anitha 《Journal of Computer and Communications》 2015年第6期34-41,共8页
Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to b... Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to be shared and coordinated with the dynamic and multi-institutional virtual organization environment becomes a challenging security issue. In this paper, an approach for trust assessment and trust degree calculation using subjective logic is suggested to allocate the Data Grid or Computational Grid user a reliable, trusted resource for maintaining the integrity of the data with fast response and accurate results. The suggested approach is explained using an example scenario and also from the simulation results. It is observed that there is an increase in the resource utilization of a trusted resource in contrast to the resource which is not trusted. 展开更多
关键词 GRID Computing virtual Organization Computational GRID Data GRID trust Management trust ASSESSMENT trust Degree CALCULATION
下载PDF
Selection of Trusted Service Providers by Enforcing Bayesian Analysis in iVCE
9
作者 顾宝军 李晓勇 汪为农 《Journal of Donghua University(English Edition)》 EI CAS 2008年第1期30-36,共7页
The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilit... The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions. 展开更多
关键词 internet-based virtual computing environment trust management Bayesian analysis
下载PDF
Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing 被引量:4
10
作者 Xin Jin Qixu Wang +2 位作者 Xiang Li Xingshu Chen Wei Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期520-534,共15页
As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM.... As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protecti on framework is developed, which can exte nd the trusted relati on ship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes. 展开更多
关键词 virtual trustED computing virtual machine LIFECYCLE trustED CHAIN security measurement state monitoring
原文传递
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
11
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment virtualIZATION mobile platform
原文传递
组建跨校虚拟教研室提升研究生专业课教学质量——车用发动机排放控制技术课程改革探索 被引量:1
12
作者 孟忠伟 彭忆强 +3 位作者 苏庆运 谭丕强 梁兴雨 吴钢 《高教学刊》 2024年第18期140-143,147,共5页
组建跨校专家教学团队,采用跨校虚拟教研室模式,以“三全”和“思政”元素融入课堂,探索一条提升研究生专业课程教学质量的途径。以车用发动机排放控制技术课程为例,从教师团队组建、课程内容设置、学生获得感三个方面,紧抓课堂教学主渠... 组建跨校专家教学团队,采用跨校虚拟教研室模式,以“三全”和“思政”元素融入课堂,探索一条提升研究生专业课程教学质量的途径。以车用发动机排放控制技术课程为例,从教师团队组建、课程内容设置、学生获得感三个方面,紧抓课堂教学主渠道,以多名跨校专家高质量授课形式潜移默化地体现科学家精神和立德树人理念。推崇以科研促进专业课教学,学生掌握必备专业知识,具备工程伦理和思辨思想。课程改革实施后,极大增强学生的家国情怀、爱岗敬业和学科自信,更加积极主动地投身科研,为提升研究生教育质量打下基础。 展开更多
关键词 研究生专业课 跨校专家团队 虚拟教研室 学生满意度 课程改革
下载PDF
差异化授权型领导与知识型员工知识隐藏——基于跨层分析 被引量:1
13
作者 郭元源 吴亮 +1 位作者 陈意锒 秦武 《科技进步与对策》 CSSCI 北大核心 2024年第5期109-118,共10页
基于团队和个体视角构建两个中介模型,探讨差异化授权型领导对知识型员工知识隐藏的内在作用机制。通过对67个团队的358位员工进行跨层检验,分析发现:在团队层面,差异化授权型领导通过降低团队信任,从而增强知识型员工知识隐藏动机;在... 基于团队和个体视角构建两个中介模型,探讨差异化授权型领导对知识型员工知识隐藏的内在作用机制。通过对67个团队的358位员工进行跨层检验,分析发现:在团队层面,差异化授权型领导通过降低团队信任,从而增强知识型员工知识隐藏动机;在个体层面,差异化授权型领导通过对知识型员工角色负荷、情绪耗竭的链式影响而诱发知识隐藏行为。上述结论丰富了差异化授权型领导影响后果研究,为促进团队成员知识分享与流动提供了重要的实践启示。 展开更多
关键词 差异化授权型领导 团队信任 角色负荷 情绪耗竭 知识隐藏
下载PDF
虚拟领导力对员工角色绩效的影响机制——基于扎根理论的双案例研究
14
作者 张健东 程宏 +1 位作者 国伟 庞冬 《管理案例研究与评论》 CSSCI 北大核心 2024年第4期616-629,共14页
数字化时代背景下,虚拟领导力成为学界关注的焦点。以贝尔科教和亿达信息两家企业为研究对象,运用扎根理论研究方法,针对虚拟领导力对员工角色绩效的影响机制进行探索性双案例研究,进而构建基于角色理论的研究模型。研究发现:虚拟领导... 数字化时代背景下,虚拟领导力成为学界关注的焦点。以贝尔科教和亿达信息两家企业为研究对象,运用扎根理论研究方法,针对虚拟领导力对员工角色绩效的影响机制进行探索性双案例研究,进而构建基于角色理论的研究模型。研究发现:虚拟领导力分为虚拟临场力、远程动态调控力、数字工具应用能力、虚拟交互能力;虚拟领导力可以从心理和技术两个层面提升员工角色绩效,且存在“虚拟领导力—角色压力—员工角色绩效”的作用路径;团队虚拟性能够强化虚拟领导力对角色压力的缓解作用。研究结论在丰富理论研究成果的同时,可以帮助企业提升管理效率。 展开更多
关键词 虚拟领导力 角色压力 员工角色绩效 团队虚拟性
下载PDF
BIM应用下知识隐藏对虚拟协作有效性的影响机理——流程双元能力的中介作用
15
作者 张涑贤 姚佳慧 贾玥 《科技进步与对策》 CSSCI 北大核心 2024年第19期128-137,共10页
虚拟协作已经成为工程项目团队突破空间限制、进行实时交互的有效途径,因此缓解成员知识隐藏行为对协作过程的负面影响是一个亟需解决的问题。基于社会交换理论和资源基础理论构建综合性概念框架,分析建筑信息模型(BIM)应用下团队成员... 虚拟协作已经成为工程项目团队突破空间限制、进行实时交互的有效途径,因此缓解成员知识隐藏行为对协作过程的负面影响是一个亟需解决的问题。基于社会交换理论和资源基础理论构建综合性概念框架,分析建筑信息模型(BIM)应用下团队成员知识隐藏行为对虚拟协作有效性的影响机制,并探究流程双元能力(流程标准性、流程敏捷性)的中介作用和团队稳定性的调节作用。对325份工程项目团队调研数据的统计分析表明:知识隐藏对虚拟协作有效性存在显著负向影响;流程双元能力在知识隐藏与虚拟协作间发挥部分中介作用;团队稳定性不仅负向调节知识隐藏与流程双元能力关系,而且会削弱流程双元能力的中介作用,存在被调节的中介效应,进一步影响虚拟协作有效性。 展开更多
关键词 知识隐藏 虚拟协作有效性 流程标准性 流程敏捷性 团队稳定性
下载PDF
区分还是融合?虚拟化团队工作模式下的员工工作-家庭平衡策略
16
作者 严鸣 郑石 《心理科学进展》 CSSCI CSCD 北大核心 2024年第5期754-770,共17页
虚拟化团队工作模式成为当前企业运作的一个发展趋势,产生了无边界的工作特征,工作和家庭领域高度重叠,改变了以往工作和家庭可区分的研究和实践前提。为此,学者开始提倡顺应无边界的发展趋势,促进工作和家庭融合。然而,基于这一管理思... 虚拟化团队工作模式成为当前企业运作的一个发展趋势,产生了无边界的工作特征,工作和家庭领域高度重叠,改变了以往工作和家庭可区分的研究和实践前提。为此,学者开始提倡顺应无边界的发展趋势,促进工作和家庭融合。然而,基于这一管理思路的企业实践却导致了一系列负面效果。这让我们不禁重新思考:在虚拟化团队工作模式发展趋势下,我们更适合采用以往的工作-家庭区分思路,还是当前的工作-家庭融合思路,抑或是其他新的管理思路?为解决这一重要问题,本研究通过社会认同理论弥补资源保存理论在解释力上的不足,探讨团队虚拟性如何影响员工的工作-家庭整合行为,采用怎样的管理思路进行有效的干预以达到工作和家庭和谐发展的效果。本研究为数智化变革下的工作-家庭平衡研究构建了新的理论框架,推动该领域理论的进一步发展,有助于指导企业从新的管理思路促进工作和家庭和谐发展。 展开更多
关键词 工作-家庭平衡 团队虚拟性 资源保存理论 社会认同理论 工作-家庭整合
下载PDF
虚拟化与密码技术应用:现状与未来
17
作者 付裕 林璟锵 冯登国 《密码学报(中英文)》 CSCD 北大核心 2024年第1期3-21,共19页
虚拟化技术是一种典型的资源管控技术,将计算机系统的计算、存储等资源抽象成为隔离的运行环境,供多个独立运行的用户态程序或客户虚拟机使用.在虚拟化系统中,可进一步使用密码技术保护用户态程序或客户虚拟机的数据、代码等运行环境信... 虚拟化技术是一种典型的资源管控技术,将计算机系统的计算、存储等资源抽象成为隔离的运行环境,供多个独立运行的用户态程序或客户虚拟机使用.在虚拟化系统中,可进一步使用密码技术保护用户态程序或客户虚拟机的数据、代码等运行环境信息,使其免受来自于恶意的程序、虚拟机、操作系统甚至Hypervisor的攻击威胁,实现更完善的安全保障.另一方面,由虚拟化技术构建的隔离运行环境,也能够用于密码系统的安全执行,为密码实现和应用提供额外的安全保障.本文系统地梳理了虚拟化与密码技术应用的结合研究:先从上述两个角度分别介绍了在原有常规计算机系统(使用不带专门硬件安全特性的CPU以及TPM芯片)的各种密码应用安全解决方案,总结了相应的特点和不足;然后,针对近年来出现的支持可信执行环境的计算机系统(使用带专门硬件安全特性的CPU,如Intel SGX、AMD SEV和ARM TrustZone等),介绍了其中的密码技术应用和密码系统构建,总结了现有研究的主要方向.最后,展望了虚拟化系统密码技术应用的未来研究发展方向. 展开更多
关键词 虚拟化 密码应用 可信执行环境
下载PDF
人机协作对项目团队绩效的影响研究:有调节的中介效应模型
18
作者 石世英 赵方方 +2 位作者 彭新新 张净净 叶晓甦 《土木工程与管理学报》 2024年第3期80-86,94,共8页
鉴于人机协作对员工及团队绩效的影响机制存在认知差异,整合资源保存理论、自我调节理论以及角色理论,构建人机协作、团队绩效,团队创造力以及团队虚拟性的被调节中介模型,并结合模糊认知图(FCM)仿真方法,对影响因素之间的相关性进行动... 鉴于人机协作对员工及团队绩效的影响机制存在认知差异,整合资源保存理论、自我调节理论以及角色理论,构建人机协作、团队绩效,团队创造力以及团队虚拟性的被调节中介模型,并结合模糊认知图(FCM)仿真方法,对影响因素之间的相关性进行动态分析。研究结果表明:(1)人机协作对团队绩效具有显著正向影响;团队创造力在人机协作与团队绩效关系之间发挥显著的中介作用;(2)团队虚拟性在直接效应和中介效应中均发挥了调节作用;(3)通过情景分析证明人机协作是影响团队绩效的最根本原因,团队虚拟性是智能技术应用的边界条件。研究结论拓展了项目情境下人机协作在项目领域的影响效应和团队虚拟性的调节机制,为项目团队科学合理应用智能技术和团队绩效管理提供借鉴。 展开更多
关键词 人机协作 工程项目 团队绩效 团队虚拟性 团队创造力
下载PDF
基于改进共识算法的虚拟电厂主从多链交易匹配机制
19
作者 王卫南 艾芊 +2 位作者 李晓露 王帝 陈旻昱 《电力工程技术》 北大核心 2024年第5期69-80,共12页
在未来新型电力系统中,虚拟电厂(virtual power plant,VPP)内部多主体的可信交易和信息安全将更加复杂和具有挑战性。而区块链技术的信息安全、分布决策、智能合约及防篡改等特征,为VPP多元主体可信交易提供新思路。文中聚焦VPP内部多... 在未来新型电力系统中,虚拟电厂(virtual power plant,VPP)内部多主体的可信交易和信息安全将更加复杂和具有挑战性。而区块链技术的信息安全、分布决策、智能合约及防篡改等特征,为VPP多元主体可信交易提供新思路。文中聚焦VPP内部多聚合商形成的利益最大化及可信交易匹配效率问题,首先,依据交易主体需求差异,建立区块链技术与多智能体系统融合的一主多从分层互动控制架构;其次,设计一种面向多聚合商对等交易需求下的可信交易匹配机制,引入非合作博弈模型,保证了多聚合商主体的利益;然后,基于区块链的分布式粒子群优化算法提出了改进的委托权威证明机制(delegated proof-of-authority,DPoA)共识算法,提高交易的安全性;最后,通过算例分析验证文中所提策略的合理性和可行性,该策略能有效增强多主体交易的匹配效率和安全性。 展开更多
关键词 虚拟电厂(VPP) 可信交易 区块链技术 分层互动 匹配机制 改进共识算法
下载PDF
价值共创视角下虚拟旅游直播的观众行为意愿影响机制研究
20
作者 罗卉 张文姣 梁增贤 《旅游论坛》 2024年第4期30-41,共12页
随着虚拟旅游直播的快速发展,如何促使观看旅游直播的观众转化为实地游客,成为旅游企业和学术研究关注的重要问题。文章从价值共创的视角出发,以北京故宫博物院为例,探讨了虚拟旅游直播的观众行为意愿影响机制和虚拟旅游直播持续参与意... 随着虚拟旅游直播的快速发展,如何促使观看旅游直播的观众转化为实地游客,成为旅游企业和学术研究关注的重要问题。文章从价值共创的视角出发,以北京故宫博物院为例,探讨了虚拟旅游直播的观众行为意愿影响机制和虚拟旅游直播持续参与意愿向实地旅游意愿转换的边界条件。结果表明:观众间互动的参与度和共鸣感染会对沉浸感和信任产生显著的正向影响,但认知交流则不会;直播内容形式和感知真实性均会对沉浸感和信任产生显著的正向影响;信任会对两种意愿产生显著的影响,但沉浸感只会影响虚拟旅游直播的持续参与意愿;高频率和丰富观看经验会削弱虚拟旅游直播持续参与意愿向实地旅游意愿的转化。文章也为旅游直播的发展提出了针对性的建议。 展开更多
关键词 虚拟旅游直播 价值共创 社会交换理论 沉浸感 信任
下载PDF
上一页 1 2 41 下一页 到第
使用帮助 返回顶部