期刊文献+
共找到1,446篇文章
< 1 2 73 >
每页显示 20 50 100
Pyridazine:A privileged scaffold in the development of 21^(st)-century pesticides
1
作者 Chao Chen Wang Geng +3 位作者 Ke Li Qiong Lei Zhichao Jin Xiuhai Gan 《Chinese Chemical Letters》 2025年第8期255-266,共12页
Pyridazine has garnered increasing attention as a privileged scaffold and bioisosterism in drug discovery due to its unique structural characteristics.It can serve as a hydrogen bond acceptor when interacting with rec... Pyridazine has garnered increasing attention as a privileged scaffold and bioisosterism in drug discovery due to its unique structural characteristics.It can serve as a hydrogen bond acceptor when interacting with receptors due to its two adjacent nitrogen atoms.Upon conversion to pyridazinone,it exhibits the ability to act as both a hydrogen bond acceptor and donor,showcasing its versatility.This inherent flexibility has prompted extensive research exploring its bioactivity in pesticides and pharmaceuticals.In order to promote the development of pyridazine-based pesticides,this review provides a comprehensive summary of advancements for pyridazine-based pesticides on herbicidal(36.9%),insecticidal(26.2%),antifungal and antibacterial(24.6%),plant growth regulatory(10.8%),and antiviral activities(1.5%)from2000 to 2024.It serves as an invaluable reference and source of inspiration for agricultural scientists conducting future research. 展开更多
关键词 PYRIDAZINE PYRIDAZINONE privilege scaffold Biological activity PESTICIDE
原文传递
The Privilege of the Medieval Universitiesfrom the Perspective of Game Theory
2
作者 李海莉 徐朋辉 《石家庄经济学院学报》 2016年第3期104-107,共4页
在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免... 在欧洲中世纪大学诞生时,身处教会、王室以及市政当局三足鼎立的紧张局面.为了争取生存的空间和发展机会,其与三者展开了艰苦的博弈过程D 博弈中的中世纪大学能够利用三者之间的矛盾巧妙周旋,从中获得了居住权、罢课权、迁徙权、免税免役权以及独立颁发教学许可证等特权,诸多的特权为大学的未来发展壮大奠定了坚实的基础,至今仍产生深远影响. 展开更多
关键词 博弈 中世纪 大学 特权
在线阅读 下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
3
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
在线阅读 下载PDF
Fas ligand expression in colon cancer:A possible mechanism of tumor immune privilege 被引量:6
4
作者 WeiZhang Er-XunDing +4 位作者 QiangWang Da-QiaoZhu JinHe Yu-LiLi Yuan-HeWang 《World Journal of Gastroenterology》 SCIE CAS CSCD 2005年第23期3632-3635,共4页
AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninet... AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes. 展开更多
关键词 Fas ligand Colon cancer Immune privilege
暂未订购
Effect of Vasocation Intestinal Peptide on Immune Privilege of the Rat Testis 被引量:1
5
作者 Wei WANG Ye-bin XI Guang-jie CHEN Jing HAO Bao-guo WANG Tian-wei SHEN Li-hua JIANG Wei-yi LI 《Journal of Reproduction and Contraception》 CAS 2008年第1期1-8,共8页
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex... Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells. 展开更多
关键词 vasocation intestinal peptide (VIP) Leydig cell FASL TFG-β immune privilege
暂未订购
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel 被引量:2
6
作者 ZHONG An-ming JIA Chun-fu 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期137-141,共5页
A privilege flow oriented intrusion detection method based on HSMM(Hidden semi-Markov Model)is discussed.The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS(Intrusion D... A privilege flow oriented intrusion detection method based on HSMM(Hidden semi-Markov Model)is discussed.The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS(Intrusion Detection System).Using the dataset of DARPA 1998,our experiment results reveal good detection performance and acceptable computation cost. 展开更多
关键词 intrusion detection privilege flow model HSMM
在线阅读 下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
7
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
在线阅读 下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
8
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI privilege management infrastructure)
在线阅读 下载PDF
Use and Abuse of Privileged Information in Italian Listed Companies
9
作者 Annalisa Baldissera 《Chinese Business Review》 2019年第1期14-29,共16页
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ... Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements. 展开更多
关键词 privileged INFORMATION FINANCIAL statements LISTED COMPANIES
在线阅读 下载PDF
Identity Governance Framework for Privileged Users
10
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
在线阅读 下载PDF
Discussion on the privilege system in the laws of the Ming Dynasty
11
作者 Chert Kai 《International English Education Research》 2014年第12期41-42,共2页
An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the fo... An important guiding thought that ran through the laws of the Ming Dynasty was "governing the country according to the corpus juries". The founding emperor of Ming Dynasty Zhu Yuanzhang found that the laws of the former Yuan Dynasty could not suit the demands of the development of the new situations, so he developed the new statutes. The laws of the Ming Dynasty absorbed the lessons that the Yuan government law and discipline ceased to be binding or become lax, and put forward that the laws must be strict, and abolished the system of the prime minister, showing a high degree of centralization. The laws of the Ming Dynasty had the important influence on the political thoughts in the late feudal society, so the researches on the legal systems in the Ming dynasty have practical significance. This paper briefly expounds the legal privileges of the Ming Dynasty for reference. 展开更多
关键词 Law of the Ming Dynasty system of privilege CENTRALIZATION
在线阅读 下载PDF
恢复原始设定的Re-pair Privileges Utility 1.0
12
《电子与金系列工程信息》 2002年第7期9-9,共1页
关键词 苹果公司 REPAIR privileges Utility1.0 系统需求 警告讯息
在线阅读 下载PDF
Genius Is Not a Privilege of the Few
13
作者 LI CHAOCHEN and HOU RUILI 《China Today》 1996年第10期28-29,共2页
GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYw... GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYwordsoutof35givent... 展开更多
关键词 Genius Is Not a privilege of the Few
在线阅读 下载PDF
Chinese-Language Software-A Privilege for Chinese
14
作者 YANG TAOYUAN 《China Today》 1994年第10期61-62,共2页
Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chin... Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long. 展开更多
关键词 Chinese-Language Software-A privilege for Chinese
在线阅读 下载PDF
列宁经济平等思想的发展及其当代启示
15
作者 易小明 蒋婷婷 《长沙大学学报》 2026年第1期1-11,共11页
列宁的经济平等思想呈现出阶段性演进特征,历经三个关键发展阶段:第一阶段为革命激进期,于“战时共产主义”政策框架下开展绝对平等实验,试图快速实现经济资源的高度均等化分配;第二阶段进入战略退却期,借助新经济政策实施平等妥协策略... 列宁的经济平等思想呈现出阶段性演进特征,历经三个关键发展阶段:第一阶段为革命激进期,于“战时共产主义”政策框架下开展绝对平等实验,试图快速实现经济资源的高度均等化分配;第二阶段进入战略退却期,借助新经济政策实施平等妥协策略,在现实国情约束下调整平等实现方式;最后阶段为政治反思期,着重强调要警惕官僚特权对经济平等原则的侵蚀和破坏。列宁经济平等思想发展的内在深层逻辑,在历史进程中彰显出理想性与现实性的动态和解、集中性与民主性的博弈张力以及阶段性与终极性的辩证统一关系。这一思想发展轨迹为我们带来三方面重要启示:需以历史唯物主义视角重新审视平等实现路径,注重通过民主化途径提升经济效率,并构建权力制度化制衡机制以保障经济平等的持续实现。 展开更多
关键词 列宁 经济平等思想 新经济政策 官僚特权 民主化
在线阅读 下载PDF
基于大模型的深层Web越权漏洞检测方法
16
作者 覃锦端 尉雯雯 +2 位作者 王月兵 柳遵梁 刘聪 《网络安全与数据治理》 2026年第2期20-27,共8页
越权漏洞检测和挖掘是传统Web应用安全的一项重要课题,越权漏洞以其覆盖面广、隐藏深、没有固定流量特征等特点,一直是Web应用漏洞治理中的难点。目前业内常见的Web越权漏洞挖掘方法以被动式检测插件配合人工手工挖掘为主,被动式检测插... 越权漏洞检测和挖掘是传统Web应用安全的一项重要课题,越权漏洞以其覆盖面广、隐藏深、没有固定流量特征等特点,一直是Web应用漏洞治理中的难点。目前业内常见的Web越权漏洞挖掘方法以被动式检测插件配合人工手工挖掘为主,被动式检测插件的原理多为替换为高权限/同权限的账号凭据,然后以返回流量包长度大小为漏洞是否存在的判断依据。此种方式虽然可以节省部分人工测试成本,但是只能检测浅层的越权漏洞,对于参数级的越权漏洞还是需要依赖人工手工测试。基于大模型技术,提出一种被动式深层Web越权漏洞检测方法,旨在通过大模型自动识别参数名含义和参数值特征,动态生成测试参数发包,并以返回流量包长度大小、具体内容等多个维度为漏洞判断依据。经测试,该方法可以挖掘出更深层次的越权漏洞,并有效节约人工手动挖掘成本。 展开更多
关键词 Web漏洞 漏洞检测 越权漏洞 大模型
在线阅读 下载PDF
基于零信任架构的数据访问控制优化研究
17
作者 李烨 《移动信息》 2026年第1期175-177,共3页
为应对传统数据访问控制中边界防护模式不佳、访问控制精度低以及内部威胁防护欠缺的问题,文中提出了一种基于零信任架构的数据访问控制优化方法。具体地,设计了基于敏感度分级的访问控制体系,并引入实时验证与动态决策机制,以增强系统... 为应对传统数据访问控制中边界防护模式不佳、访问控制精度低以及内部威胁防护欠缺的问题,文中提出了一种基于零信任架构的数据访问控制优化方法。具体地,设计了基于敏感度分级的访问控制体系,并引入实时验证与动态决策机制,以增强系统对多样化安全威胁的响应能力。研究表明,零信任架构不仅可提升数据保护的精细度和实时性,还能有效降低安全事件的发生频率,提升了整体系统的安全性和效率。 展开更多
关键词 零信任架构 数据访问控制 权限管理 异常检测 安全性
在线阅读 下载PDF
某妇产科医院手术准入安全与质量管理的实践与思考
18
作者 傅东霞 何玲非 +1 位作者 薛俊军 朱燕飞 《医院管理论坛》 2025年第6期31-35,共5页
医生手术准入管理是医疗质量管理的重要内容。某大型妇产科医院多年来积极实践探索医师手术准入的管理模式,根据国家卫生健康委员会相关规定结合实际工作制定医院手术分级目录,形成具有妇产科专科特色的手术准入资质申请、考核、授权、... 医生手术准入管理是医疗质量管理的重要内容。某大型妇产科医院多年来积极实践探索医师手术准入的管理模式,根据国家卫生健康委员会相关规定结合实际工作制定医院手术分级目录,形成具有妇产科专科特色的手术准入资质申请、考核、授权、监督、再评价、再授权的运行体系。手术准入管理实践取得了良好成效,可为其它大型医院特别是妇产专科医院手术准入管理提供参考借。 展开更多
关键词 妇产科 手术分级管理 技术准入
暂未订购
从“特权”到“人权”:1789年《人权宣言》的诞生与法国社会转型
19
作者 李宏图 《复旦学报(社会科学版)》 北大核心 2025年第1期128-139,共12页
在世界现代历史上,1789年的法国革命具有重要的意义,其标志之一即是通过了《人权宣言》,完成了从特权向人权的社会转型。本文从历史维度梳理了《人权宣言》起草的历史语境与过程,诸项权利的内容及其意涵,评价其作为摧毁“旧制度”和构... 在世界现代历史上,1789年的法国革命具有重要的意义,其标志之一即是通过了《人权宣言》,完成了从特权向人权的社会转型。本文从历史维度梳理了《人权宣言》起草的历史语境与过程,诸项权利的内容及其意涵,评价其作为摧毁“旧制度”和构建“新社会”的价值指向。与此同时,也解析《人权宣言》这一文本中“自然权利”和“社会权利”之间具有的内在矛盾和张力。通过这些考察,可以更为清晰地理解《人权宣言》的历史价值与局限,以及其彰显的意义。 展开更多
关键词 《人权宣言》 法国革命 特权 自然权利 社会转型
原文传递
上一页 1 2 73 下一页 到第
使用帮助 返回顶部