期刊文献+
共找到21,347篇文章
< 1 2 250 >
每页显示 20 50 100
Copyright Authorization Statement
1
《Meteorological and Environmental Research》 2025年第2期61-61,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission authorization PUBLICATION meteorological environmental research
在线阅读 下载PDF
Copyright Authorization Statement
2
《Agricultural Science & Technology》 2025年第2期24-24,共1页
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist... Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 information network transmission information network COPYRIGHT digital reproduction Agricultural Science Technology COMPILATION authorization PUBLICATION
暂未订购
Copyright Authorization Statement
3
《Meteorological and Environmental Research》 2025年第1期75-75,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission authorization PUBLICATION meteorological environmental research
在线阅读 下载PDF
Copyright Authorization Statement
4
《Meteorological and Environmental Research》 2025年第3期80-80,共1页
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro... Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 COPYRIGHT digital reproduction METEOROLOGICAL environmental research information network transmission authorization PUBLICATION meteorological environmental research
在线阅读 下载PDF
Copyright Authorization Statement
5
《Agricultural Science & Technology》 2025年第1期6-6,共1页
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist... Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights. 展开更多
关键词 information network transmission information network COPYRIGHT digital reproduction Agricultural Science Technology COMPILATION authorization PUBLICATION
在线阅读 下载PDF
《子午流注针经》作者及版本考述
6
作者 樊旭 房芑霖 +1 位作者 刘可扬 李姣莹 《辽宁中医药大学学报》 2026年第1期1-6,共6页
《子午流注针经》作为现存最早的子午流注专著,具有重要的学术价值。该研究通过文献考证与版本调研,系统梳理了该书的作者、成书年代及版本特征。经调查发现,现存10个版本分藏于我国上海、中国台湾、宁波及日本,包括刊刻本与手抄本,年... 《子午流注针经》作为现存最早的子午流注专著,具有重要的学术价值。该研究通过文献考证与版本调研,系统梳理了该书的作者、成书年代及版本特征。经调查发现,现存10个版本分藏于我国上海、中国台湾、宁波及日本,包括刊刻本与手抄本,年代跨越元、明、清三代,主要分为“燕山活济堂”“广勤活济堂”和“罗氏竹坪书堂”三大版本体系。其中最具代表性的刊刻本包括:元至大辛亥年(公元1311年)以“燕山活济堂”名义刊行的元刊本,为现存最早版本,收录于《针灸四书》之中,馆藏于宁波天一阁博物馆;明宣德七年(1432年)“广勤活济堂”刊本,为海外回归版,内容保存是10版中最为完整的一版,且字迹清晰,刊刻精美,现藏日本宫内厅;明成化九年(1473年)“罗氏竹坪书堂”刊本,经补录修订后刊行,现藏中国台北故宫博物院。版本各具特色,均具有重要的研究价值。该研究通过系统比对,明确了各版本的特征与学术价值,为中医古籍保护与子午流注理论研究提供了重要的文献依据。 展开更多
关键词 子午流注针经 作者 版本 中医古籍 医学文献
原文传递
一种智能法律合约驱动的联邦学习数据授权和执行方法
7
作者 孟疏桐 周铖鑫 +4 位作者 朱岩 王楠 余彦婷 薛显斌 李勇 《工程科学学报》 北大核心 2026年第2期331-345,共15页
在数字经济时代,数据已成为社会创新的核心生产要素.联邦学习具有“数据不动、模型动”的特点,推动了数据使用方式从“数据集中共享”向“模型协同计算”数据要素流通方式的转型,然而,现有将区块链与智能合约应用于联邦学习的工作多侧... 在数字经济时代,数据已成为社会创新的核心生产要素.联邦学习具有“数据不动、模型动”的特点,推动了数据使用方式从“数据集中共享”向“模型协同计算”数据要素流通方式的转型,然而,现有将区块链与智能合约应用于联邦学习的工作多侧重于数据溯源和激励机制,在法律责任界定上仍缺乏有效的“法链结合”数据确权、合约执行监督、和权益分配机制.针对这一问题,本文提出了一种智能法律合约驱动的联邦学习数据授权和执行方法,构建了基于智能法律合约SPESC语言的联邦学习监督架构,通过合约条款对联邦学习任务的执行进行发布、分配与监控.该架构中的授权与执行管理平台通过数据授权模块对数据授权合约模板实现“要约–承诺–执行–仲裁”的数据要素全链条管理,其优势在于:结合去中心化标识和区块链技术对合约当事人进行身份认证,并采用可自动执行的合约条款进行数据授权,同时设计了违约和仲裁条款对数据确权和权益分配进行监督,确保不同主体间数据使用权与经营权的合规性,其中的联邦计算模块通过合约模板对联邦系统中的计算任务进行配置,并实现对执行权责的监督.实验结果表明,在相同的训练轮数下本文方法较传统方法模型准确率提升了约5%,并在30轮内达到98%的收敛准确率.实验验证了数据授权合约中数据授权条款的自动执行与链上追溯,确保了联邦学习中的身份合规性与授权透明性,并设计了针对参与节点间的联邦计算合约模板,通过该模板对节点选择算法进行性能分析,结果表明算法的模型训练较稳定,收敛速度较快,研究为推动数据要素市场数字化转型提供了一种新的思路. 展开更多
关键词 联邦学习 智能法律合约 数据授权 数据流通 区块链
在线阅读 下载PDF
Instructions for Authors
8
《International Journal of Minerals,Metallurgy and Materials》 2026年第1期F0002-F0002,共1页
International Journal of Minerals,Metallurgy and Materials is dedicated to the publication and the dissemination of original research articles (and occasional invited reviews) in the fields of Minerals,Metallurgy and ... International Journal of Minerals,Metallurgy and Materials is dedicated to the publication and the dissemination of original research articles (and occasional invited reviews) in the fields of Minerals,Metallurgy and Materials.It is covered by EI Compendex,SCI Expanded,Chemical Abstract,etc.Manuscript preparation The following components are required for a complete manuscript:Title,Author(s),Author affiliation(s),Abstract,Keywords,Main text,Acknowledgements and References. 展开更多
关键词 METALLURGY MINERALS research articles materials ei compendexsci complete manuscript titleauthor s author REVIEWS
在线阅读 下载PDF
网络爬取侵害企业数据权益的三阶法律判断
9
作者 赵自轩 《河北法学》 北大核心 2026年第1期76-100,共25页
网络爬取个人信息是互联网中常见的数据获取方式,当前司法实践中采取的竞争法救济路径将企业数据权益视为排他性权利,忽略了个人信息的公共价值和被爬取者的数据提供义务,严重损害了爬取者的合法权益。网络爬取是一个动态的数据利用过程... 网络爬取个人信息是互联网中常见的数据获取方式,当前司法实践中采取的竞争法救济路径将企业数据权益视为排他性权利,忽略了个人信息的公共价值和被爬取者的数据提供义务,严重损害了爬取者的合法权益。网络爬取是一个动态的数据利用过程,应结合不同阶段的法律规定和利用方式进行侵权判断。在数据获取阶段,以非法方式获取个人信息数据构成侵权,但在法定情形下,爬取者通过自助行为获取数据的除外;在数据利用阶段,违反法律规定和有效的授权许可协议的利用,对公开个人信息推断数据的替代性利用构成侵权;在数据处分阶段,转让、披露非法获取的数据,违反法律规定或有效的授权许可协议转让、披露数据构成侵权,但转让、披露公共数据和加工过的公开个人信息原始数据不构成侵权。 展开更多
关键词 网络爬取 个人信息数据 可携带权 授权许可协议 替代性利用
原文传递
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
10
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
在线阅读 下载PDF
Authorization Management Framework Based on Joint Trust-Risk Evaluation 被引量:1
11
作者 YANG Qiuwei WU Sunyong +1 位作者 HONG Fan LIAO Junguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期9-12,共4页
Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource ... Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource are granted on the basis of their trust relation in distributed environment. Nevertheless, dynamic change of the status of credential and chain of trust induces to uncertainty of trust relation. Considering uncertainty of authorization and analyzing deficiency of authorization model only based on trust, we proposes joint trust-risk evaluation and build the model based on fuzzy set theory, and make use of the membership grade of fuzzy set to express joint trust-risk relation. Finally, derivation principle and constraint principle of joint trust-risk relationships are presented. The authorization management model is defined based on joint trust-risk evaluation, proof of compliance and separation of duty are analyzed. The proposed model depicts not only trust relationship between principals, but also security problem of authorization. 展开更多
关键词 trust management authorization management risk evaluation proof of compliance fuzzy set
在线阅读 下载PDF
A Workflow Authorization Model Based on Credentials 被引量:1
12
作者 XING Guang-lin HONG Fan CAI Hui 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期198-202,共5页
A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state wh... A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state which nicely ensure synchronizing authorization flow with workflow; specifies authorization policy not only based on user identifiers but also based on user qualifications and characteristics; defines a set of constraint rules for a task and seek the eligible users to execute the task according to the type of each constraint rule which realize dynamic separation of duty; and realizes the access granularity of authorization ranging from objects to specific parts of objects which ensure the least privilege constraints much more better. 展开更多
关键词 CREDENTIALS WORKFLOW authorization model
在线阅读 下载PDF
Conflict detection and resolution for authorization policies in workflow systems 被引量:1
13
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1082-1092,共11页
The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective co... The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts. 展开更多
关键词 Workflow management system (WFMS) authorization policy Conflict detection and resolution
原文传递
A Quantum Authorization Management Protocol Based on EPRPairs 被引量:1
14
作者 Yan Chang Shibin Zhang +5 位作者 Lili Yan Guihua Han Haiquan Song Yan Zhang Xueyang Li Qirun Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期1005-1014,共10页
Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is ... Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols. 展开更多
关键词 Quantum authorization management entanglement swapping fin-grained rights division
在线阅读 下载PDF
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization 被引量:1
15
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3801-3813,共13页
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen... Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme. 展开更多
关键词 CP-ABE geohash new time tree(NTT) multi authorization dynamic attribute
在线阅读 下载PDF
An Approach for Handling Conflicts in Authorization
16
作者 ZHANG Mingsheng ZHANG Mingyi 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期626-630,共5页
Based on logic programs, authorization conflicts and resolution strategies are analyzed through the explanation of some examples on the health care sector. A resolution scheme for handling conflicts in high level auth... Based on logic programs, authorization conflicts and resolution strategies are analyzed through the explanation of some examples on the health care sector. A resolution scheme for handling conflicts in high level authorization specification by using logic program with ordered disjunction (LPOD) is proposed. The scheme is useful for solving conflicts resulted from combining positive and negative authorization, complexity of authorization management, and less clarity of the specification. It can well specify kinds of conflicts (such as exceptional conflicts, potential conflicts), and is based on literals and dependent contexts. Thus it is expressive and available. It is shown that authorizations based on rules LPOD is very important both in theory and practice. 展开更多
关键词 authorization authorization conflict conflict resolution schema logic program with ordered disjunction
在线阅读 下载PDF
TrustedRBAC——A Distributed Authorization Infrastructure Span Multiple Autonomous Domains
17
作者 WANGZhi-gang LUZheng-ding LIRui-xuan WUWei WANGXiao-gang 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期694-698,共5页
TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to def... TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. This paper describes the TrustedRBAC model and its scalable design and implementation. 展开更多
关键词 X.509 attribute certificate RBAC authorization virtual enterprise
在线阅读 下载PDF
A Family of RBAC-Based Workflow Authorization Models
18
作者 HONGFan XINGGuang-lin 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期324-328,共5页
A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permissio... A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permission which means that a user can perform certainoperation on a task only for a time interval, this not only ensure that only authorized users couldexecute a task but also ensure that the authorization flow is synchronised with workflow. The twoadvance models of RWAM deal with role hierarchy and constraints respectively RWAM ranges from simpleto complex and provides a general reference model for other researches and developments of suchareah. 展开更多
关键词 workflow authorization temporal permission RBAC
在线阅读 下载PDF
Authorization Administration in a Distributed Multi-application Environment
19
作者 DUANSujuan HONGFan LIXinhua 《Geo-Spatial Information Science》 2004年第4期303-307,共5页
To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new acce... To meet the authorization administration requirements in a distributedcomputer network environment, this paper extends the role-based access control model with multipleapplication dimensions and establishes a new access control model ED-RBAC(Extended Role Based AccessControl Model) for the distributed environment. We propose an extendable hierarchical authorizationassignment framework and design effective role-registeringi role-applying and role-assigningprotocol with symmetric and asymmetric cryptographic systems. The model can be used to simplifyauthorization administration in a distributed environment with multiple applications. 展开更多
关键词 authorization administration role-based control distributed environment
在线阅读 下载PDF
Power authorization by adding digital controller to electrical equipment
20
作者 单庆晓 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期281-286,共6页
Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor. This paper pro poses a digitalized power system based on synthetical transmission carrier which makes the power system a... Unpredicted load behaviour troubles traditional power system and becomes a main unstable factor. This paper pro poses a digitalized power system based on synthetical transmission carrier which makes the power system also serves as a data communication system with the same structure. Loads get authorized before powered on, so their behaviour is predictable. Digitalized power system includes such basic units as digital power source, hub and load. Their concepts are explained, their behaviour and implements arc also described in detail. Real time distribution of residual power is applied, which makes prompt authorization possible. Communication protocol and load address assignments are also presented in this paper. A prototype is built and the results verify the effect of the new proposed power system. 展开更多
关键词 power distribution power transmission power authorization power system
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部