期刊文献+
共找到9,483篇文章
< 1 2 250 >
每页显示 20 50 100
Improved Authenticated Multi-Key Agreement Protocol
1
作者 ZHANG Hua YUAN Zheng WEN Qiaoyan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1915-1918,共4页
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a con... Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack. 展开更多
关键词 multi-key agreement authenticate Diffie Hellman key agreement concatenation attack
在线阅读 下载PDF
Database of Clause Depth of China’s Regional Trade Agreement and Its Characteristics
2
作者 Jin Sun Ruixian Chen 《Proceedings of Business and Economic Studies》 2025年第4期345-359,共15页
This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of Ch... This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of China’s RTAs is measured across three-dimensional systems(policy areas,clauses,and core clauses)and two generations of trade policy areas(WTO+,WTO-X,and all policy areas).It is observed that China’s RTAs exhibit greater depth in Industrial Products,Agricultural Products,TBT,Antidumping,Countervailing,and Investment,while showing comparatively less depth in Fiscal Policy,Innovation Policies,and related areas. 展开更多
关键词 Regional trade agreement Clause depth Database construction agreement text
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
3
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
4
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
A Review and Outlook of Bilateral Eco-nomic and Trade Cooperation Against the Backdrop of the 20th Anniversary of the China-Chile Free Trade Agreement
5
作者 Gao Shujun Lu Yao 《China's Foreign Trade》 2025年第5期44-52,共9页
Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sig... Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sign a bilateral free trade agreement with China and the first to reach an upgraded protocol.Chile also established mutual recognition of Authorized Economic Operators(AEO)with China,the first country in South America to do so. 展开更多
关键词 mutual recognition authorized economic operators aeo bilateral free trade agreement Latin America AEO authorized economic operators bilateral economic cooperation trade agreement China Chile FTA
在线阅读 下载PDF
Policy coherence analysis of Türkiye’s lignite production and the Paris agreement ratification:an investigation through the water‑energy‑climate nexus
6
作者 Suleyman O.Altiparmak 《International Journal of Coal Science & Technology》 2025年第2期52-67,共16页
Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,ther... Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,there is also a water issue:lignite is usually found submerged below the local groundwater tables.Mining lignite could be exploited to achieve drinkable and agriculturally usable water.In today’s literature,while the impact of lignite production on global warming and emissions are already highly discussed,the water management side of the issue is regularly omitted.However,considering the complex interlink between these three areas(the Water-Energy-Climate(WEC)nexus)is necessary within policy coherence,which is mostly ignored even though it is one of the development targets.Here in this framework,Turkiye,which aims to reduce its heavy dependency on energy imports,is worth studying because almost all of its coal,the country’s largest fossil resource,is lignite.Therefore,this study examines the WEC nexus related to lignite production and combustion and seeks policy coherence between their outputs in the context of Turkiye’s historical steps to climate change mitigation,specifically oriented with the Paris Agreement.This story expands from the absence of specific development policy objectives to the practicalities of politics and economics. 展开更多
关键词 Turkiye LIGNITE Water-energy-climate(WEC)nexus Paris agreement Sustainable development goals
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
7
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
8
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
Quantum-resistant dynamic authenticated group key agreement scheme for the Internet of Things
9
作者 JIANG Rui XU Tengyu 《Journal of Southeast University(English Edition)》 2025年第3期392-400,共9页
With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibilit... With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibility of information leakage.In this paper,we propose a anti-quantum dynamic authenticated group key agreement scheme(AQDA-GKA)according to the ring-learning with errors(RLWE)problem,which is suitable for IoT environments.First,the proposed AQDA-GKA scheme can implement a group key agreement against quantum computing attacks by leveraging an RLWE-based key agreement mechanism.Second,this scheme can achieve dynamic node management,ensuring that any node can freely join or exit the current group.Third,we formally prove that the proposed scheme can resist quantum computing attacks as well as collusion attacks.Finally,the performance and security analysis reveals that the proposed AQDA-GKA scheme is secure and effective. 展开更多
关键词 group key agreement lattice-based cryptogra-phy dynamic authentication collusion attack resistance Internet of Things
在线阅读 下载PDF
A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments
10
作者 Muhammad Asghar KHAN Insaf ULLAH +2 位作者 Haralambos MOURATIDIS Abdulmajeed ALQHATANI Pascal LORENZ 《Chinese Journal of Aeronautics》 2025年第10期245-259,共15页
Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunatel... Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunately,this crucial process often occurs through unsecured wireless connections,exposing it to numerous cyber-physical attacks.Furthermore,UAVs’limited onboard computing resources make it challenging to perform complex cryptographic operations.The main aim of constructing a cryptographic scheme is to provide substantial security while reducing the computation and communication costs.This article introduces an efficient and secure cross-domain Authenticated Key Agreement(AKA)scheme that uses Hyperelliptic Curve Cryptography(HECC).The HECC,a modified version of ECC with a smaller key size of 80 bits,is well-suited for use in UAVs.In addition,the proposed scheme is employed in a cross-domain environment that integrates a Public Key Infrastructure(PKI)at the receiving end and a Certificateless Cryptosystem(CLC)at the sending end.Integrating CLC with PKI improves network security by restricting the exposure of encryption keys only to the message’s sender and subsequent receiver.A security study employing ROM and ROR models,together with a comparative performance analysis,shows that the proposed scheme outperforms comparable existing schemes in terms of both efficiency and security. 展开更多
关键词 Computation cost Cross-domain authentication Hyperelliptic curve cryptography Key agreement ROM ROR SECURITY Unmanned aerial vehicles
原文传递
Evaluating the impact of the BBNJ Agreement on regulatory gaps in a competent IFB:a case study of MGRs management in the Antarctic Treaty Area
11
作者 PAN Min 《Advances in Polar Science》 2025年第3期203-212,共10页
On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was a... On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was adopted.The BBNJ Agreement aims to regulate the conservation and sustainable use of marine biodiversity in areas beyond national jurisdiction,including the high seas and the international seabed area.The BBNJ Agreement enters into an already crowded institutional landscape as a global authority with broad objectives,inevitably interacting with existing institutions,frameworks,and bodies(IFBs).Existing research has primarily focused on two areas:the first examines the impact of the institutions established by the BBNJ Agreement on existing marine governance IFBs;the second explores its influence on issues currently lacking institutional arrangements.However,comparatively little attention has been given to the Agreement’s potential impact on governance gaps within established systems.This paper takes the case of marine genetic resource(MGRs)management in the Antarctic Treaty Area to explore how the BBNJ Agreement may address regulatory gaps in a competent governance framework.Due to shortcomings in addressing core issues,concerning the legal status of MGRs access regulations,benefit-sharing mechanisms,and disclosure of origin,the Agreement is unlikely to have a significant impact on the governance of MGRs in the Antarctic Treaty System(ATS)in the short term.On the other hand,the ATS,as an effective governance framework for the Antarctic Treaty Area,has mature regulations and practical experience in Antarctic governance.Over the years,the ATS has focused on regulating bioprospecting activities as scientific research ones and strict environmental impact assessment procedures.However,there has not been an effective consensus on the regulation of commercial biological prospecting.This paper further explores the coordination issue between the BBNJ Agreement and the ATS,suggesting that in the future,MGRs governance in the Antarctic Treaty Area may evolve into a polycentric governance system. 展开更多
关键词 BBNJ agreement Antarctic Treaty System(ATS) marine genetic resources(MGRs) polycentric governance
在线阅读 下载PDF
China’s Approach to Labor Provisions in Free Trade Agreements:Evolution,Impact,and Framework
12
作者 WU Wenfang HUANG Linhan JIANG Yu(Translated) 《The Journal of Human Rights》 2025年第2期341-369,共29页
Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns... Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns with labor indicators in“Doing Business”,the assessment of business situations issued by the World Bank.It differs from the labor rights protection focus emphasized in trade agreements.The latest strategic documents issued by the State Council of China have addressed this issue to fully achieve the goal of aligning Free Trade Zones with high-standard trade agreements.Building on the development of Free Trade Zone legislation and domestic labor law governance,China should proactively explore a tailored approach to labor provisions in Free Trade Agreements.In this approach,it should explicitly define the“baseline”and“ceiling”for labor provisions during negotiations and,within this framework,establish benchmarks for labor rights protection,enforcement mechanisms,and cross-border regulatory mechanisms suited to the specific conditions of the agreement parties. 展开更多
关键词 labor law governance pilot free trade zones free trade agreements labor standards China’s approach
原文传递
区域贸易协定环境规则对企业出口产品范围的影响
13
作者 杨继军 郭欣然 《国际商务研究》 北大核心 2026年第1期16-30,共15页
本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,... 本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,这一结论在经过一系列内生性检验与稳健性检验后依然成立。机制检验结果表明,区域贸易协定环境规则通过增加企业生产经营成本与促进企业技术进步两条渠道推动企业缩小出口产品范围。异质性分析表明,区域贸易协定环境规则对经营能力强、融资约束高的企业缩小出口产品范围的推动作用更强。进一步分析表明,区域贸易协定环境规则有利于提高企业出口产品质量与企业全球价值链的嵌入度;政府效能强化了区域贸易协定环境规则对企业出口产品范围的影响。本文的研究结论对推动中国出口企业绿色转型、实现对外贸易高质量发展与碳达峰碳中和目标具有重要意义。 展开更多
关键词 区域贸易协定环境规则 企业出口产品范围 核心产品出口占比
在线阅读 下载PDF
行政协议无效认定的民法适用限度
14
作者 伍华军 张望 《决策与信息》 2026年第1期39-48,共10页
行政协议无效认定有行政法和民法两套标准,但现行法未对其适用逻辑作出清晰规定。我国在司法实践中已经形成了单独适用行政法、单独适用民法、同时适用行政法和民法三种适用模式,但存在过度适用民法的问题,进而侵蚀了行政协议的行政本... 行政协议无效认定有行政法和民法两套标准,但现行法未对其适用逻辑作出清晰规定。我国在司法实践中已经形成了单独适用行政法、单独适用民法、同时适用行政法和民法三种适用模式,但存在过度适用民法的问题,进而侵蚀了行政协议的行政本质和行政合法性审查的核心地位。基于行政协议本质属性与行政诉讼之定位,“先行后民”“行主民辅”的法律适用逻辑更为妥当。基于此,应准确把握行政协议无效认定的民法适用时机及限度。具体而言,要精准界定意思表示不真实条款、强制性规定条款及公序良俗条款的适用边界,以期最大化地适用《行政诉讼法》第75条之规定。 展开更多
关键词 行政协议 民法 行政法 无效认定 强制性规定
在线阅读 下载PDF
RTA数字贸易规则深度对数字服务出口的影响研究
15
作者 高越 李昊 《山东理工大学学报(社会科学版)》 2026年第1期5-20,F0002,共17页
基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,... 基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,规则深度的促进效应越明显。此外,数字贸易规则深度对不同国家间数字服务出口的影响存在异质性,在不同签署身份中,规则深度对“组织—国家”间相互出口的促进作用最为显著;对高收入国家间相互出口的促进作用更为显著,而在高收入国家与非高收入国家之间及非高收入国家之间的贸易关系中,其促进效应相对较弱;不同数字服务行业的出口对数字贸易规则深度的依赖程度也存在差异,知识、技术密集型的数字服务行业受到的促进影响最大。建议在制定区域贸易协定时重视规则深度的设计,以更好地推动数字服务出口。 展开更多
关键词 数字贸易规则深度 网络分析法 数字服务出口 区域贸易协定
在线阅读 下载PDF
韩国药品风险分担协议研究及对我国医保准入的启示
16
作者 张天琪 曾柳春 +2 位作者 张文 王琳宁 路云 《中国新药杂志》 北大核心 2026年第2期121-127,共7页
我国创新药发展正处于快速崛起阶段,目前风险分担协议已成为一项协调政府、保险公司、制药企业等各方共同应对由临床疗效不确定性、高昂的研发成本以及新药研发中固有的报销压力所带来的多方面挑战的关键政策工具。本文将从适用范围、... 我国创新药发展正处于快速崛起阶段,目前风险分担协议已成为一项协调政府、保险公司、制药企业等各方共同应对由临床疗效不确定性、高昂的研发成本以及新药研发中固有的报销压力所带来的多方面挑战的关键政策工具。本文将从适用范围、类型划分、退款担保、应用流程、实施效果这5个关键维度分析韩国药品风险分担协议政策,提出我国应从特殊药品出发探索协议适用范围,形成多样化的风险分担协议类型,做好风险分担协议流程实施保障等建议,进一步完善我国创新药相关政策。 展开更多
关键词 风险分担协议 创新药 韩国
原文传递
贸易自由化的收入效应:基于自由贸易协定的视角
17
作者 周立宏 黄先海 陈林 《浙江社会科学》 北大核心 2026年第1期20-35,156,157,共18页
本文通过构建涉及两个国家、两种产品以及两种生产要素的古诺博弈模型,匹配中国工业企业数据库和海关数据库,利用理论与实证结合的分析范式,从自由贸易协定的视角探讨在当前中国情境下贸易自由化的收入效应。研究表明:签订自由贸易协定... 本文通过构建涉及两个国家、两种产品以及两种生产要素的古诺博弈模型,匹配中国工业企业数据库和海关数据库,利用理论与实证结合的分析范式,从自由贸易协定的视角探讨在当前中国情境下贸易自由化的收入效应。研究表明:签订自由贸易协定提升了企业的出口贸易量,扩大了企业对劳动力的需求,企业进一步通过提高劳动报酬吸引劳动力流入,这提升了劳动力的工资收入;签订自由贸易协定对高技术产品出口贸易量的提升作用显著大于对低技术产品出口贸易量的提升作用,进一步推动出口结构优化调整,这一过程扩大了企业对高技能劳动力的需求,提高了劳动收入份额。 展开更多
关键词 贸易自由化 自由贸易协定 出口结构 劳动力工资 劳动收入份额
在线阅读 下载PDF
基于WS-Agreement的资源预留与QoS监控框架
18
作者 祁超 张璟 强洪夫 《计算机应用》 CSCD 北大核心 2008年第9期2199-2203,共5页
目前还没有遵循OGSA/WSRF规范的网格服务中间件能够很好地支持基于QoS协商的网格资源管理,因此重点研究了如何设计一个执行服务级协定(SLA)的框架,能够在网格中协商资源预留和任务执行期间对所在资源的QoS监控。首先通过定义资源预留的X... 目前还没有遵循OGSA/WSRF规范的网格服务中间件能够很好地支持基于QoS协商的网格资源管理,因此重点研究了如何设计一个执行服务级协定(SLA)的框架,能够在网格中协商资源预留和任务执行期间对所在资源的QoS监控。首先通过定义资源预留的XML Schema,使得资源请求者和提供者基于WS-Agreement能够协商包含关于资源预留的协定;然后遵循WSRF及WS-*规范设计和开发出一组Web服务用于构建一个基于WS-Agreement的资源预留与QoS监控框架(RMF),并将其集成到Globus资源管理模型中;最后通过理论分析和模拟实验评估了RMF的综合性能。 展开更多
关键词 服务级协定 资源预留 协同分配 作业提交描述语言 协定
在线阅读 下载PDF
Possible Chinese Strategic Responses to the Trans-Pacific Partnership Agreement
19
作者 李春顶 John Whalley 《China Economist》 2016年第1期23-46,共24页
Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not j... Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not joined the TPP. This has provoked much debate in China as to the best strategic approach to the TPP This paper analyzes China's possible strategy for the TPP agreement. We make three key points. First, the security of market access should be China's main concern in any free-trade agreement negotiations, regrettably, it is not included in TPP. The second point is that the present TPP agreement is somewhat diminished from its ambitious original claims. We suggest four strategies for China. The first is to promote the development of China's remaining regional and bilateral free trade agreements (FTAs). The second is to negotiate a bilateral FTA with the United States. The third is to promote deep domestic reforms via enlarged TPP coverage. The last is negotiating entrance to the entering do not worsen. TPP as soon as possible so that terms of 展开更多
关键词 Trans-Pacific Partnership China free trade agreement
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部