期刊文献+
共找到20,425篇文章
< 1 2 250 >
每页显示 20 50 100
国际档案领域人工智能研究进展及启示——基于I Trust AI项目五项课题研究的述评
1
作者 潘未梅 曹飞羽 张佳琦 《北京档案》 北大核心 2025年第8期12-18,共7页
伴随着人工智能技术的发展与普及,人工智能技术对档案学学科的影响已成为档案领域深入研究与探讨的热点议题。为推动我国档案学领域人工智能相关研究的创新性发展,本文对国际档案领域规模最大、持续时间最长、影响最为深远的跨国跨学科... 伴随着人工智能技术的发展与普及,人工智能技术对档案学学科的影响已成为档案领域深入研究与探讨的热点议题。为推动我国档案学领域人工智能相关研究的创新性发展,本文对国际档案领域规模最大、持续时间最长、影响最为深远的跨国跨学科项目InterPARES第五期——I(nterPARES)Trust AI项目的部分前沿成果进行介绍,旨在为我国档案学界的理论探索与实践应用提供参考。 展开更多
关键词 InterPARES I trust AI 人工智能 档案
在线阅读 下载PDF
TrustZone半虚拟化与容器化实现机制
2
作者 余发江 王朝州 《信息网络安全》 北大核心 2025年第10期1523-1536,共14页
TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种Tr... TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种TrustZone半虚拟化与容器化实现机制pvTEE,使虚拟机或容器中的客户能够高效、并行利用主机平台的可信执行环境运行可信应用。pvTEE通过前端驱动vTEEdriver、虚拟设备vTEE、主机代理程序vTEEproxy以及后端驱动TEEdriver,将虚拟机或容器内客户的调用请求转发至可信执行环境中的可信应用执行。主机、虚拟机和容器中的客户仅可调用自身场景的可信应用,无法访问其他应用。同时,主机、虚拟机及容器各自有独立的日志获取能力与安全存储服务。pvTEE基于ARMv8.2 CPU服务器、QEMU KVM虚拟机和Docker容器实现,实验结果表明,客户在虚拟机中调用可信应用完成一次RSA加解密操作,相比在主机场景中仅增加约6%的时间开销。 展开更多
关键词 trustZONE 可信执行环境 虚拟化 容器化 云服务
在线阅读 下载PDF
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
3
作者 Binyong Li Liangming Deng +1 位作者 Jie Zhang Xianhui Deng 《Computers, Materials & Continua》 SCIE EI 2025年第1期407-426,共20页
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions. 展开更多
关键词 Automotive industry chain cross-domain access block chain delegate authority trust assessment
在线阅读 下载PDF
TRUST试验在以精神行为异常为首发症状的神经梅毒患者诊断中的异质性研究
4
作者 朱英蓉 郑德健 毛艳 《宜春学院学报》 2025年第6期71-74,107,共5页
目的:探讨TRUST试验在以精神行为异常为首发症状的神经梅毒(NS)患者诊断中的异质性。方法:选取2023年1月至2024年11月我院收治的80例梅毒患者,根据首发症状是否为精神行为异常,划分为NS组和非NS组。收集两组有关临床资料,以单因素和多因... 目的:探讨TRUST试验在以精神行为异常为首发症状的神经梅毒(NS)患者诊断中的异质性。方法:选取2023年1月至2024年11月我院收治的80例梅毒患者,根据首发症状是否为精神行为异常,划分为NS组和非NS组。收集两组有关临床资料,以单因素和多因素Logistic回归分析梅毒患者发生以精神行为异常为首发症状NS的独立影响因素,根据ROC曲线计算各指标诊断效能。结果:单因素分析结果显示,两组的年龄、中性粒细胞数、淋巴细胞数、神经系统症状及TRUST滴度均有显著差异(均P<0.05);多因素Logistic回归分析显示,年龄、中性粒细胞数、TRUST滴度均为以精神行为异常为首发症状NS的独立影响因素(均P<0.05)。结论:TRUST试验在以精神行为异常为首发症状的NS患者诊断中存在异质性,综合年龄、中性粒细胞数、TRUST滴度三个诊断指标有助于提高NS的诊断准确性。 展开更多
关键词 神经梅毒 精神行为异常 trust试验 诊断 异质性
暂未订购
Understanding the Impact of AI-Mediated Communication on Trust Formation and Negotiation Outcomes in Professional Remote Collaboration
5
作者 Natalie Nkembuh 《Journal of Computer and Communications》 2025年第2期172-190,共19页
This study investigates the effects of AI-mediated communication (AMC) on trust-building and negotiation outcomes in professional remote collaboration settings. Through a mixed-methods approach combining experimental ... This study investigates the effects of AI-mediated communication (AMC) on trust-building and negotiation outcomes in professional remote collaboration settings. Through a mixed-methods approach combining experimental design and qualitative analysis (N = 120), we examine how AI intermediaries influence communication dynamics, relationship building, and decision-making processes. Results indicate that while AMC initially creates barriers to trust formation, it ultimately leads to enhanced communication outcomes and stronger professional relationships when implemented with appropriate transparency and support. The study revealed a 31% improvement in cross-cultural understanding and a 24% increase in negotiation satisfaction rates when using AI-mediated channels with proper transparency measures. These findings contribute to the theoretical understanding of technology-mediated communication and practical applications for organizations implementing AI communication tools. 展开更多
关键词 AI-Mediated Communication trust Formation Professional Collaboration Negotiation Outcomes Remote Work
在线阅读 下载PDF
Blockchain-Based Trust Model for Inter-Domain Routing
6
作者 Qiong Yang Li Ma +3 位作者 Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 2025年第3期4821-4839,共19页
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks. 展开更多
关键词 Inter-domain routing BGP security blockchain trust model trust mechanisms trust evaluation
在线阅读 下载PDF
不同孕周应用苄星青霉素G对妊娠梅毒患者的疗效评估及对母婴结局和TRUST滴度的干预效果
7
作者 邵美丽 王林林 +1 位作者 董高宏 王雅静 《临床和实验医学杂志》 2025年第20期2204-2207,共4页
目的评估不同孕周应用苄星青霉素G对妊娠梅毒患者的疗效,及其对母婴结局和甲苯胺红不加热血清试验(TRUST)滴度的干预效果。方法回顾性选取2021年6月至2024年6月西北妇女儿童医院收治的98例妊娠梅毒患者,按不同孕周应用苄星青霉素G分为3... 目的评估不同孕周应用苄星青霉素G对妊娠梅毒患者的疗效,及其对母婴结局和甲苯胺红不加热血清试验(TRUST)滴度的干预效果。方法回顾性选取2021年6月至2024年6月西北妇女儿童医院收治的98例妊娠梅毒患者,按不同孕周应用苄星青霉素G分为3组:孕早期组(≤13+6周,n=32)、孕中期组(14~27+6周,n=33)和孕晚期组(≥28周,n=33)。比较3组产妇治疗前、治疗2个疗程后的氧化应激指标[超氧化物歧化酶(SOD)、丙二醛、晚期氧化蛋白产物(AOPP)]水平、新生儿及产妇TRUST滴度比、产妇情况(产后出血率、早产率)及新生儿情况(先天梅毒儿、出生后5 min Apgar评分、体质量)。结果(1)较治疗前,3组产妇治疗2个疗程后血清SOD水平均更高,丙二醛、AOPP水平均更低,差异均有统计学意义(P<0.05);较孕早期组,孕中期组、孕晚期组产妇治疗2个疗程后SOD水平更低,丙二醛、AOPP水平更高,差异均有统计学意义(P<0.05)。(2)孕中期组、孕晚期组新生儿治疗后TRUST阴性率分别为30.30%、24.24%,较孕早期组(56.25%)更低,差异有统计学意义(P<0.05)。(3)孕中期组、孕晚期组产妇治疗后TRUST阴性率分别为9.09%、3.03%,较孕早期组(28.13%)更低,差异有统计学意义(P<0.05)。(4)较孕早期组,孕中期组、孕晚期组新生儿先天梅毒儿占比更高,出生后5 min Apgar评分、体质量更低,差异均有统计学意义(P<0.05)。结论妊娠梅毒患者孕早期应用苄星青霉素G疗效优于孕中期和孕晚期,对氧化应激改善更为显著,能进一步提升母婴TRUST阴性率及改善母婴结局。 展开更多
关键词 梅毒 妊娠 苄星青霉素G 母婴结局 trust滴度
暂未订购
Trusted identification and trusted product data: GS1’s vision for collaborative global standards
8
作者 Renaud de Barbuat 《China Standardization》 2025年第5期42-42,共1页
GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-qua... GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world. 展开更多
关键词 improve commerce supply chainwhy trusted product data supply chains product identification bar codea trusted data trusted identification physical product
原文传递
Standards help build global trust and enable innovation in the AI era
9
《China Standardization》 2025年第5期2-3,共2页
Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?
关键词 STANDARDS build global trust responsible innovation AI global trust
原文传递
A multi-dimensional trust attestation solution in 5G-IoT
10
作者 Xiangrong Li Yu Zhang +2 位作者 Haotian Zhu Yubo Wang Junjia Huang 《Digital Communications and Networks》 2025年第1期225-233,共9页
The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important... The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important to IoT security.5G-IoT with its low latency,wide connectivity and high-speed transmission extends the business scenarios of IoT,yet it also brings new challenges to trust proof solutions of IoT.Currently,there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes,while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios.In order to solve the above problems,this paper proposes an adaptive multi-dimensional trust proof solution.Firstly,the static and dynamic attributes of sensing nodes are metricized,and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes,and a multi-dimensional fine-grained trusted metric model is established in this paper.Then,based on the comprehensive metrics,the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes.At the same time,the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency.Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes,while having a small impact on the latency of the 5G network. 展开更多
关键词 5G-IoT trusted metrics trust model
在线阅读 下载PDF
Toward zero trust in 5G Industrial Internet collaboration systems
11
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 Zero trust 5G Industrial Internet collaboration system trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation
12
作者 Xiaogang Yuan Huan Pei Yanlin Wu 《Computers, Materials & Continua》 2025年第9期5555-5575,共21页
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili... In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value. 展开更多
关键词 Wireless sensor networks intrusion detection dynamic trust evaluation data noise detection trust recovery mechanism
在线阅读 下载PDF
International AI standards:Forging trust and fueling innovation
13
作者 Sung Hwan Cho 《China Standardization》 2025年第5期20-21,共2页
Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the In... Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization. 展开更多
关键词 international standards build global trust ISO IEC responsible innovation clarity coherence AI standardization forge trust
原文传递
Multidimensional challenges in promoting acupuncture for insomnia:Cultural,economic,and patient provider trust perspectives
14
作者 Ming-Min Zhu Wen-Hui Qiu Hua-Chong Xu 《World Journal of Psychiatry》 2025年第9期7-10,共4页
A recent study of patient-centered perspectives by Zhao et al,published in the World Journal of Psychiatry,identified key facilitators and barriers that influence insomnia patients’choice of acupuncture therapy,offer... A recent study of patient-centered perspectives by Zhao et al,published in the World Journal of Psychiatry,identified key facilitators and barriers that influence insomnia patients’choice of acupuncture therapy,offering insights for clinical practice and policy-making to enhance the integration of acupuncture therapy into comprehensive insomnia management.While acupuncture demonstrates unique advantages as a complementary medical approach,its broader adoption is hindered by complex multidimensional factors.This paper proposes a“dynamic balance model”encompassing the cultural,economic,and patient-provider trust dimensions,and emphasizes the need for synergistic optimization through cultural narrative transformation,institutional innovation,and digital empowerment.These strategies aim to facilitate the promotion of acupuncture for insomnia treatment and its global expansion. 展开更多
关键词 ACUPUNCTURE INSOMNIA Cultural identity Economic accessibility Patientprovider trust
暂未订购
Research on Recommendation Algorithm Based on TrustSVD++and XGBoost
15
作者 Gongjin Chen Yantao He Yuting Kong 《Journal of Electronic Research and Application》 2025年第3期342-349,共8页
Aiming at the problem that the data in the user rating matrix is missing and the importance of implicit trust between users is ignored when using the TrustSVD model to fill it,this paper proposes a recommendation algo... Aiming at the problem that the data in the user rating matrix is missing and the importance of implicit trust between users is ignored when using the TrustSVD model to fill it,this paper proposes a recommendation algorithm based on TrustSVD++and XGBoost.Firstly,the explicit trust and implicit trust were introduced into the SVD++model to construct the TrustSVD++model.Secondly,considering that there is much data in the interaction matrix after filling,which may lead to a rather complex calculation process,the K-means algorithm is introduced to cluster and extract user and item features at the same time.Then,in order to improve the accuracy of rating prediction for target users,an XGBoost model is proposed to train user and item features,and finally,it is verified on the data sets MovieLens-1M and MovieLens-100k.Experiments show that compared with the SVD++model and the recommendation algorithm without XGBoost model training,the proposed algorithm has the RMSE value reduced by 2.9%and the MAE value reduced by 3%. 展开更多
关键词 trustSVD++ XGBoost Feature extraction CLUSTERING Implicit trust information
在线阅读 下载PDF
Zero Trust Networks: Evolution and Application from Concept to Practice
16
作者 Yongjun Ren Zhiming Wang +3 位作者 Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 2025年第2期1593-1613,共21页
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ... In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions. 展开更多
关键词 Zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
在线阅读 下载PDF
Research on Quantification Mechanism of Data Source Reliability Based on Trust Evaluation
17
作者 Gaoshang Lu Fa Fu Zixiang Tang 《Computers, Materials & Continua》 2025年第6期4239-4256,共18页
In the data transaction process within a data asset trading platform,quantifying the trustworthiness of data source nodes is challenging due to their numerous attributes and complex structures.To address this issue,a ... In the data transaction process within a data asset trading platform,quantifying the trustworthiness of data source nodes is challenging due to their numerous attributes and complex structures.To address this issue,a distributed data source trust assessment management framework,a trust quantification model,and a dynamic adjustment mechanism are proposed.Themodel integrates the Analytic Hierarchy Process(AHP)and Dempster-Shafer(D-S)evidence theory to determine attribute weights and calculate direct trust values,while the PageRank algorithm is employed to derive indirect trust values.Thedirect and indirect trust values are then combined to compute the comprehensive trust value of the data source.Furthermore,a dynamic adjustment mechanism is introduced to continuously update the comprehensive trust value based on historical assessment data.By leveraging the collaborative efforts of multiple nodes in the distributed network,the proposed framework enables a comprehensive,dynamic,and objective evaluation of data source trustworthiness.Extensive experimental analyses demonstrate that the trust quantification model effectively handles large-scale data source trust assessments,exhibiting both strong trust differentiation capability and high robustness. 展开更多
关键词 trust evaluation data source reliability distributed network quantification mechanism
在线阅读 下载PDF
The Current Situation and Trends of Trusted Execution Environment Applications
18
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期121-126,共6页
With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.... With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected. 展开更多
关键词 trusted execution environment Data security Privacy protection Cloud computing
在线阅读 下载PDF
The Geography of Political Trust in Urbanizing China:A Comparative Analysis of Trust in Local Government Among Rural Villagers,Rural-to-Urban Migrants,and Urban Dwellers
19
作者 ZHANG Chen LI Ziming 《Management Studies》 2025年第4期147-160,共14页
The legacy of rural-urban developmental imbalance and China’s household registration institution(i.e.,the hukou system)stratify Chinese citizens into three populations—rural villagers,urban dwellers,and rural-to-urb... The legacy of rural-urban developmental imbalance and China’s household registration institution(i.e.,the hukou system)stratify Chinese citizens into three populations—rural villagers,urban dwellers,and rural-to-urban migrants.These groups differ in values,lifestyles,and socioeconomic status.They have also been assigned to different tiers of government control and services based upon their location and hukou identities.Effective governance of these diverse and divided populations in urbanizing China requires a deeper understanding of their potentially different political orientations and attitudes toward government and why such differences exist.However,despite their demographic significance—by 2014,China’s rural-to-urban migrant population had reached to 253 million—rural-to-urban migrants remain unrepresented in studies of Chinese people’s political trust,which focus more on either rural villagers or urban dwellers.This study addresses this gap by situating Chinese rural-to-urban migrants at the center of triadic analytical framework and comparing their trust in local(i.e.,county-level)government to two reference groups:rural villagers and urban dwellers.We utilize data from the China Family Panel Study(CFPS)in 2014 and employ the propensity score matching(PSM)method to match rural-to-urban migrants and rural villagers with comparable propensities to migrate.This matched comparison found that rural-to-urban migrants are 4.91%less trusting of their county government than their rural villager counterparts.This result reflects a negative“urban effect”:The urban society may erode political trust compared to rural environments.Then the method of mechanical matching(MM)is used to compare rural-to-urban migrants and urban dwellers.This matched comparison found that rural-to-urban migrants are 3.2%more trusting than their urban counterparts.This indicates that the migrant identity(i.e.,being a rural hukou holders in cities)is associated with higher trust levels.This geography of political trust signals a more complex rural-urban divide in the citizen-government relationship in China.Different populations’various relationship with local government therefore merits additional attention to place-based and population-specific policies to rebuild trust. 展开更多
关键词 rural-to-urban migrants rural-urban divide political trust propensity score matching China
在线阅读 下载PDF
Oscillation of doubt:a historical odyssey of vaccine hesitancy and the evolution of public trust
20
作者 Zong-Zhen Wu Jian-Liang Huang +5 位作者 Kun-Lan Zuo Wan-Ying Gao Qiang-Yu Xiang Lu Zhang Zi-Han Wang Huan Liu 《History and Philosophy of Medicine》 2025年第1期25-35,共11页
Background:Vaccine hesitancy remains a pressing global challenge,impacting the acceptance and distribution of both long-established and newly developed vaccines.This paper investigates the multifaceted nature of vacci... Background:Vaccine hesitancy remains a pressing global challenge,impacting the acceptance and distribution of both long-established and newly developed vaccines.This paper investigates the multifaceted nature of vaccine hesitancy,focusing on the development of the measles vaccine as a historical case study,while drawing comparisons to the coronavirus disease 2019(COVID-19)pandemic.Methods:The study employs a historical and comparative approach to analyze vaccine hesitancy.It examines how technological advances,public policy,and communication strategies have influenced vaccine acceptance.Key lessons from the development of the measles vaccine are compared with challenges encountered during the rapid development and deployment of COVID-19 vaccines.Results:Both historical and contemporary examples reveal commonalities and differences in addressing vaccine hesitancy.While the measles vaccine demonstrated the importance of long-term safety evaluations and public trust-building,the COVID-19 vaccine highlighted the challenges of rapid development timelines and combating misinformation in a digital age.The findings underscore the necessity of transparent communication,equitable access,and proactive engagement in overcoming hesitancy.Conclusion:Understanding the historical and contemporary dynamics of vaccine hesitancy is crucial for promoting public trust and equitable vaccination in an evolving global health landscape.Effective strategies,combining historical lessons with modern innovations,can address public concerns and enhance vaccine acceptance. 展开更多
关键词 vaccine hesitancy measles vaccine public trust health education science communication
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部