期刊文献+
共找到9,466篇文章
< 1 2 250 >
每页显示 20 50 100
Database of Clause Depth of China’s Regional Trade Agreement and Its Characteristics
1
作者 Jin Sun Ruixian Chen 《Proceedings of Business and Economic Studies》 2025年第4期345-359,共15页
This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of Ch... This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of China’s RTAs is measured across three-dimensional systems(policy areas,clauses,and core clauses)and two generations of trade policy areas(WTO+,WTO-X,and all policy areas).It is observed that China’s RTAs exhibit greater depth in Industrial Products,Agricultural Products,TBT,Antidumping,Countervailing,and Investment,while showing comparatively less depth in Fiscal Policy,Innovation Policies,and related areas. 展开更多
关键词 Regional trade agreement Clause depth Database construction agreement text
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
2
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
3
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
A Review and Outlook of Bilateral Eco-nomic and Trade Cooperation Against the Backdrop of the 20th Anniversary of the China-Chile Free Trade Agreement
4
作者 Gao Shujun Lu Yao 《China's Foreign Trade》 2025年第5期44-52,共9页
Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sig... Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sign a bilateral free trade agreement with China and the first to reach an upgraded protocol.Chile also established mutual recognition of Authorized Economic Operators(AEO)with China,the first country in South America to do so. 展开更多
关键词 mutual recognition authorized economic operators aeo bilateral free trade agreement Latin America AEO authorized economic operators bilateral economic cooperation trade agreement China Chile FTA
在线阅读 下载PDF
Policy coherence analysis of Türkiye’s lignite production and the Paris agreement ratification:an investigation through the water‑energy‑climate nexus
5
作者 Suleyman O.Altiparmak 《International Journal of Coal Science & Technology》 2025年第2期52-67,共16页
Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,ther... Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,there is also a water issue:lignite is usually found submerged below the local groundwater tables.Mining lignite could be exploited to achieve drinkable and agriculturally usable water.In today’s literature,while the impact of lignite production on global warming and emissions are already highly discussed,the water management side of the issue is regularly omitted.However,considering the complex interlink between these three areas(the Water-Energy-Climate(WEC)nexus)is necessary within policy coherence,which is mostly ignored even though it is one of the development targets.Here in this framework,Turkiye,which aims to reduce its heavy dependency on energy imports,is worth studying because almost all of its coal,the country’s largest fossil resource,is lignite.Therefore,this study examines the WEC nexus related to lignite production and combustion and seeks policy coherence between their outputs in the context of Turkiye’s historical steps to climate change mitigation,specifically oriented with the Paris Agreement.This story expands from the absence of specific development policy objectives to the practicalities of politics and economics. 展开更多
关键词 Turkiye LIGNITE Water-energy-climate(WEC)nexus Paris agreement Sustainable development goals
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
6
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
7
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
Quantum-resistant dynamic authenticated group key agreement scheme for the Internet of Things
8
作者 JIANG Rui XU Tengyu 《Journal of Southeast University(English Edition)》 2025年第3期392-400,共9页
With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibilit... With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibility of information leakage.In this paper,we propose a anti-quantum dynamic authenticated group key agreement scheme(AQDA-GKA)according to the ring-learning with errors(RLWE)problem,which is suitable for IoT environments.First,the proposed AQDA-GKA scheme can implement a group key agreement against quantum computing attacks by leveraging an RLWE-based key agreement mechanism.Second,this scheme can achieve dynamic node management,ensuring that any node can freely join or exit the current group.Third,we formally prove that the proposed scheme can resist quantum computing attacks as well as collusion attacks.Finally,the performance and security analysis reveals that the proposed AQDA-GKA scheme is secure and effective. 展开更多
关键词 group key agreement lattice-based cryptogra-phy dynamic authentication collusion attack resistance Internet of Things
在线阅读 下载PDF
A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments
9
作者 Muhammad Asghar KHAN Insaf ULLAH +2 位作者 Haralambos MOURATIDIS Abdulmajeed ALQHATANI Pascal LORENZ 《Chinese Journal of Aeronautics》 2025年第10期245-259,共15页
Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunatel... Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunately,this crucial process often occurs through unsecured wireless connections,exposing it to numerous cyber-physical attacks.Furthermore,UAVs’limited onboard computing resources make it challenging to perform complex cryptographic operations.The main aim of constructing a cryptographic scheme is to provide substantial security while reducing the computation and communication costs.This article introduces an efficient and secure cross-domain Authenticated Key Agreement(AKA)scheme that uses Hyperelliptic Curve Cryptography(HECC).The HECC,a modified version of ECC with a smaller key size of 80 bits,is well-suited for use in UAVs.In addition,the proposed scheme is employed in a cross-domain environment that integrates a Public Key Infrastructure(PKI)at the receiving end and a Certificateless Cryptosystem(CLC)at the sending end.Integrating CLC with PKI improves network security by restricting the exposure of encryption keys only to the message’s sender and subsequent receiver.A security study employing ROM and ROR models,together with a comparative performance analysis,shows that the proposed scheme outperforms comparable existing schemes in terms of both efficiency and security. 展开更多
关键词 Computation cost Cross-domain authentication Hyperelliptic curve cryptography Key agreement ROM ROR SECURITY Unmanned aerial vehicles
原文传递
Evaluating the impact of the BBNJ Agreement on regulatory gaps in a competent IFB:a case study of MGRs management in the Antarctic Treaty Area
10
作者 PAN Min 《Advances in Polar Science》 2025年第3期203-212,共10页
On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was a... On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was adopted.The BBNJ Agreement aims to regulate the conservation and sustainable use of marine biodiversity in areas beyond national jurisdiction,including the high seas and the international seabed area.The BBNJ Agreement enters into an already crowded institutional landscape as a global authority with broad objectives,inevitably interacting with existing institutions,frameworks,and bodies(IFBs).Existing research has primarily focused on two areas:the first examines the impact of the institutions established by the BBNJ Agreement on existing marine governance IFBs;the second explores its influence on issues currently lacking institutional arrangements.However,comparatively little attention has been given to the Agreement’s potential impact on governance gaps within established systems.This paper takes the case of marine genetic resource(MGRs)management in the Antarctic Treaty Area to explore how the BBNJ Agreement may address regulatory gaps in a competent governance framework.Due to shortcomings in addressing core issues,concerning the legal status of MGRs access regulations,benefit-sharing mechanisms,and disclosure of origin,the Agreement is unlikely to have a significant impact on the governance of MGRs in the Antarctic Treaty System(ATS)in the short term.On the other hand,the ATS,as an effective governance framework for the Antarctic Treaty Area,has mature regulations and practical experience in Antarctic governance.Over the years,the ATS has focused on regulating bioprospecting activities as scientific research ones and strict environmental impact assessment procedures.However,there has not been an effective consensus on the regulation of commercial biological prospecting.This paper further explores the coordination issue between the BBNJ Agreement and the ATS,suggesting that in the future,MGRs governance in the Antarctic Treaty Area may evolve into a polycentric governance system. 展开更多
关键词 BBNJ agreement Antarctic Treaty System(ATS) marine genetic resources(MGRs) polycentric governance
在线阅读 下载PDF
China’s Approach to Labor Provisions in Free Trade Agreements:Evolution,Impact,and Framework
11
作者 WU Wenfang HUANG Linhan JIANG Yu(Translated) 《The Journal of Human Rights》 2025年第2期341-369,共29页
Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns... Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns with labor indicators in“Doing Business”,the assessment of business situations issued by the World Bank.It differs from the labor rights protection focus emphasized in trade agreements.The latest strategic documents issued by the State Council of China have addressed this issue to fully achieve the goal of aligning Free Trade Zones with high-standard trade agreements.Building on the development of Free Trade Zone legislation and domestic labor law governance,China should proactively explore a tailored approach to labor provisions in Free Trade Agreements.In this approach,it should explicitly define the“baseline”and“ceiling”for labor provisions during negotiations and,within this framework,establish benchmarks for labor rights protection,enforcement mechanisms,and cross-border regulatory mechanisms suited to the specific conditions of the agreement parties. 展开更多
关键词 labor law governance pilot free trade zones free trade agreements labor standards China’s approach
原文传递
行政协议无效认定的民法适用限度
12
作者 伍华军 张望 《决策与信息》 2026年第1期39-48,共10页
行政协议无效认定有行政法和民法两套标准,但现行法未对其适用逻辑作出清晰规定。我国在司法实践中已经形成了单独适用行政法、单独适用民法、同时适用行政法和民法三种适用模式,但存在过度适用民法的问题,进而侵蚀了行政协议的行政本... 行政协议无效认定有行政法和民法两套标准,但现行法未对其适用逻辑作出清晰规定。我国在司法实践中已经形成了单独适用行政法、单独适用民法、同时适用行政法和民法三种适用模式,但存在过度适用民法的问题,进而侵蚀了行政协议的行政本质和行政合法性审查的核心地位。基于行政协议本质属性与行政诉讼之定位,“先行后民”“行主民辅”的法律适用逻辑更为妥当。基于此,应准确把握行政协议无效认定的民法适用时机及限度。具体而言,要精准界定意思表示不真实条款、强制性规定条款及公序良俗条款的适用边界,以期最大化地适用《行政诉讼法》第75条之规定。 展开更多
关键词 行政协议 民法 行政法 无效认定 强制性规定
在线阅读 下载PDF
RTA数字贸易规则深度对数字服务出口的影响研究
13
作者 高越 李昊 《山东理工大学学报(社会科学版)》 2026年第1期5-20,F0002,共17页
基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,... 基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,规则深度的促进效应越明显。此外,数字贸易规则深度对不同国家间数字服务出口的影响存在异质性,在不同签署身份中,规则深度对“组织—国家”间相互出口的促进作用最为显著;对高收入国家间相互出口的促进作用更为显著,而在高收入国家与非高收入国家之间及非高收入国家之间的贸易关系中,其促进效应相对较弱;不同数字服务行业的出口对数字贸易规则深度的依赖程度也存在差异,知识、技术密集型的数字服务行业受到的促进影响最大。建议在制定区域贸易协定时重视规则深度的设计,以更好地推动数字服务出口。 展开更多
关键词 数字贸易规则深度 网络分析法 数字服务出口 区域贸易协定
在线阅读 下载PDF
基于WS-Agreement的资源预留与QoS监控框架
14
作者 祁超 张璟 强洪夫 《计算机应用》 CSCD 北大核心 2008年第9期2199-2203,共5页
目前还没有遵循OGSA/WSRF规范的网格服务中间件能够很好地支持基于QoS协商的网格资源管理,因此重点研究了如何设计一个执行服务级协定(SLA)的框架,能够在网格中协商资源预留和任务执行期间对所在资源的QoS监控。首先通过定义资源预留的X... 目前还没有遵循OGSA/WSRF规范的网格服务中间件能够很好地支持基于QoS协商的网格资源管理,因此重点研究了如何设计一个执行服务级协定(SLA)的框架,能够在网格中协商资源预留和任务执行期间对所在资源的QoS监控。首先通过定义资源预留的XML Schema,使得资源请求者和提供者基于WS-Agreement能够协商包含关于资源预留的协定;然后遵循WSRF及WS-*规范设计和开发出一组Web服务用于构建一个基于WS-Agreement的资源预留与QoS监控框架(RMF),并将其集成到Globus资源管理模型中;最后通过理论分析和模拟实验评估了RMF的综合性能。 展开更多
关键词 服务级协定 资源预留 协同分配 作业提交描述语言 协定
在线阅读 下载PDF
Possible Chinese Strategic Responses to the Trans-Pacific Partnership Agreement
15
作者 李春顶 John Whalley 《China Economist》 2016年第1期23-46,共24页
Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not j... Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not joined the TPP. This has provoked much debate in China as to the best strategic approach to the TPP This paper analyzes China's possible strategy for the TPP agreement. We make three key points. First, the security of market access should be China's main concern in any free-trade agreement negotiations, regrettably, it is not included in TPP. The second point is that the present TPP agreement is somewhat diminished from its ambitious original claims. We suggest four strategies for China. The first is to promote the development of China's remaining regional and bilateral free trade agreements (FTAs). The second is to negotiate a bilateral FTA with the United States. The third is to promote deep domestic reforms via enlarged TPP coverage. The last is negotiating entrance to the entering do not worsen. TPP as soon as possible so that terms of 展开更多
关键词 Trans-Pacific Partnership China free trade agreement
在线阅读 下载PDF
Security agreement汉译探析 被引量:1
16
作者 张法连 刘耘男 《中国科技术语》 2018年第1期44-48,共5页
security agreement通常译为"担保协议",内容囊括动产担保与不动产担保。但在美国的法律文本中,security agreement的含义范围与中国法律中的"担保合同"并不对等。文章围绕security agreement在美国法律中的不同含... security agreement通常译为"担保协议",内容囊括动产担保与不动产担保。但在美国的法律文本中,security agreement的含义范围与中国法律中的"担保合同"并不对等。文章围绕security agreement在美国法律中的不同含义讨论其中文译名。 展开更多
关键词 担保 担保协议 法律术语
在线阅读 下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
17
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
在线阅读 下载PDF
关系契约视角下导生关系的异化与纠偏
18
作者 刘宁 《黑龙江高教研究》 北大核心 2026年第2期104-110,共7页
导生关系是高校内部法律关系中的重要内容,其良性发展直接关乎校内秩序稳定和学生权利实现。在学术自治语境下,教师教育权的支配性形成了实质意义上的支配型导生关系。引入关系契约理论,导生之间虽无直接的契约关系,但二者可以在教育教... 导生关系是高校内部法律关系中的重要内容,其良性发展直接关乎校内秩序稳定和学生权利实现。在学术自治语境下,教师教育权的支配性形成了实质意义上的支配型导生关系。引入关系契约理论,导生之间虽无直接的契约关系,但二者可以在教育教学过程中自行订立导生协议并形成契约关系,以便更好地明确双方的权利与义务。关系契约在导生关系治理中充当对话协商的平台,推动双方关系由支配型转向平权型。在条款设置上,导生协议应当对权利、义务、责任条款作出具体安排并保持不同条款的均衡配置。相互交涉、院系调解、校内申诉仲裁共同构成导生协议纠纷多元化解决机制。 展开更多
关键词 关系契约 导生关系 导生协议 契约工具
在线阅读 下载PDF
政府合同的合法性审查——合同与行政行为区分审查模式的提出
19
作者 蔡睿 《云南社会科学》 北大核心 2026年第1期118-127,共10页
将政府合同分割为“行政协议”与“民事合同”,对前者比照行政行为进行合法性审查,不仅引发同案不同判的担忧,亦造成司法审查进退失据而陷入自相矛盾的境地。“行政协议”不是行政行为,而是合同,现今关于其特殊性的论述均不能推翻这一... 将政府合同分割为“行政协议”与“民事合同”,对前者比照行政行为进行合法性审查,不仅引发同案不同判的担忧,亦造成司法审查进退失据而陷入自相矛盾的境地。“行政协议”不是行政行为,而是合同,现今关于其特殊性的论述均不能推翻这一事实。回归事物本质,宜对政府合同统一把握,适用民法规则评价其效力。为防止行政机关滥用行政权力,则须直面政府合同中的行政行为,按照依法行政原则的要求对其进行合法性审查。区分政府合同本身与涉及政府合同的行政行为,分别适用私法和公法进行审查,各司其职、各安其位、各得其所,能够兼顾意思自治、信赖保护与依法行政诸原则,应是构建政府合同司法审查模式的可行路径。考虑到行政行为与政府合同审查结论的关联性,可考虑由一个法庭受理一次解决纠纷,但须打通程序壁垒。 展开更多
关键词 行政协议 政府合同 行政行为 合法性审查 区分模式
在线阅读 下载PDF
网络爬取侵害企业数据权益的三阶法律判断
20
作者 赵自轩 《河北法学》 北大核心 2026年第1期76-100,共25页
网络爬取个人信息是互联网中常见的数据获取方式,当前司法实践中采取的竞争法救济路径将企业数据权益视为排他性权利,忽略了个人信息的公共价值和被爬取者的数据提供义务,严重损害了爬取者的合法权益。网络爬取是一个动态的数据利用过程... 网络爬取个人信息是互联网中常见的数据获取方式,当前司法实践中采取的竞争法救济路径将企业数据权益视为排他性权利,忽略了个人信息的公共价值和被爬取者的数据提供义务,严重损害了爬取者的合法权益。网络爬取是一个动态的数据利用过程,应结合不同阶段的法律规定和利用方式进行侵权判断。在数据获取阶段,以非法方式获取个人信息数据构成侵权,但在法定情形下,爬取者通过自助行为获取数据的除外;在数据利用阶段,违反法律规定和有效的授权许可协议的利用,对公开个人信息推断数据的替代性利用构成侵权;在数据处分阶段,转让、披露非法获取的数据,违反法律规定或有效的授权许可协议转让、披露数据构成侵权,但转让、披露公共数据和加工过的公开个人信息原始数据不构成侵权。 展开更多
关键词 网络爬取 个人信息数据 可携带权 授权许可协议 替代性利用
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部