期刊文献+
共找到781篇文章
< 1 2 40 >
每页显示 20 50 100
Channel Estimation for Full-Duplex Relay Transmission in Cloud Radio Access Networks 被引量:2
1
作者 HU Chunjing LI Jian +1 位作者 MAO Zhendong BAN Yourong 《China Communications》 SCIE CSCD 2015年第11期35-42,共8页
Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous ch... Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous channel state information(CSI). In this paper,the channel estimation issue in FD amplify-andforward relay networks is considered,where the training-based estimation technique is adopted. Firstly,the least square(LS) estimation is implemented to obtain composite channel coefficients of source-relay-destination(SRD) channel and relay loop-interference(LI) channel in order to assist destination in performing data detection. Secondly,both LS and maximum likelihood estimation methods are utilized to perform individual channel estimation aiming at supporting successive interference cancelation at destination. Finally,simulation results demonstrate the effectiveness of both composite and individual channel estimation,and the presented ML method can achieve lower MSEs than LS solution. 展开更多
关键词 CHANNEL estimation full-duplex cloud RADIO access NETWORKS
在线阅读 下载PDF
Semi-Blind Pilot-Aided Channel Estimation in Uplink Cloud Radio Access Networks 被引量:1
2
作者 Yourong Ban Qiang Hu +1 位作者 Zhendong Mao Zhongyuan Zhao 《China Communications》 SCIE CSCD 2016年第9期72-79,共8页
In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimatio... In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimation utilizes the unknown data symbols in addition to the known pilot symbols to estimate the channel. An initial channel state information (CSI) obtained by least-squared (LS) estimation is needed in semi-blind estimation. BFGS (Brayben, Fletcher, Goldfarb and Shanno) algorithm, which employs data as well as pilot symbols, estimates the CSI though solving the problem provided by maximum-likelihood (ML) principle. In addition, mean-square-error (MSE) used to evaluate the estimation performance can be further minimized with an optimal pilot design. Simulation results show that the semi-blind estimation achieves a significant improvement in terms of MSE performance over the conventional LS estimation by utilizing data symbols instead of increasing the number of pilot symbols, which demonstrates the estimation accuracy and spectral efficiency are both improved by semiblind estimation for C-RANs. 展开更多
关键词 cloud radio access networks semi-blind channel estimation
在线阅读 下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
3
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
在线阅读 下载PDF
Access Control Policy Analysis and Access Denial Method for Cloud Services 被引量:1
4
作者 Chi-Lun Liu 《Journal of Electronic Science and Technology》 CAS 2013年第2期176-180,共5页
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme... Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 展开更多
关键词 access control cloud services ONTOLOGY PAYMENT service level agreement.
在线阅读 下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
5
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
在线阅读 下载PDF
RoBAC—A New Way of Access Control for Cloud 被引量:1
6
作者 G. Krishnamoorthy N. UmaMaheswari R. Venkatesh 《Circuits and Systems》 2016年第7期1113-1119,共7页
Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predom... Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predominant storage that is being in use currently, also paves way to various access control problems. Though there are various access control mechanisms such as RBAC, ABAC, they are designed on the user’s perspective such as the role held by the user or other attributes assigned to the user. A new access control mechanism called object relationship based access control (RoBAC) has been developed based on the relations held among the users. The policy decision of access control is based on the relationship among the classes followed in the Java programming. Results have shown that this model best suits various scenarios in the cloud environment, and it also shows that the time for making decision either to allow or to deny is reduced compared to the existing system. 展开更多
关键词 cloud access Control Class Relations ROLES
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
7
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 cloud Computing cloud DATA STORAGE cloud Service PROVIDER Formula-Based cloud DATA access Control Multi-Agent System and Secure Java Agent Development Framework
在线阅读 下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
8
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
Performance Analysis in Cloud Radio Access Networks:User-Centralized Coordination Approach
9
作者 Munzali Ahmed Abana SUN Yaohua +2 位作者 Manzoor Ahmed Lukman A.Olawoyin LI Yong 《China Communications》 SCIE CSCD 2015年第11期12-23,共12页
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per... The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes. 展开更多
关键词 cloud radio access network POISSON point process COVERAGE probability joint COORDINATED transmission BASEBAND unit
在线阅读 下载PDF
Server-aided access control for cloud computing 被引量:1
10
作者 WENG Jian WENG Jia-si +1 位作者 LIU Jia-nan HOU Lin 《网络与信息安全学报》 2016年第10期58-76,共19页
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres... With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved. 展开更多
关键词 计算机网络 网络管理 应用程序 信息安全
在线阅读 下载PDF
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
11
作者 Aljwhrh Almtrf Mohamed Zohdy 《Journal of Computer and Communications》 2019年第12期37-49,共13页
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ... Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing. 展开更多
关键词 cloud COMPUTING Web Application access Control Data PRIVACY PRIVACY Framework
在线阅读 下载PDF
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
12
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
面向云网融合的零信任安全技术研究综述
13
作者 王子豪 崔鹏帅 +4 位作者 潘璠 胡宇翔 田乐 陈鸿昶 邬江兴 《网络与信息安全学报》 2026年第1期18-39,共22页
云网融合通过智能协同调度云计算和网络资源,实现了更加高效的信息基础设施服务,但同时也带来了安全边界模糊和策略动态变化等安全问题。基于零信任理念的安全架构打破了传统内外网边界,能够有效应对云网环境中的安全威胁。首先,系统梳... 云网融合通过智能协同调度云计算和网络资源,实现了更加高效的信息基础设施服务,但同时也带来了安全边界模糊和策略动态变化等安全问题。基于零信任理念的安全架构打破了传统内外网边界,能够有效应对云网环境中的安全威胁。首先,系统梳理了云网融合的研究进展,并深入分析了云网融合场景下的安全风险;然后,针对云网融合的安全需求,阐述了零信任机制在云网融合场景下的防护优势,并对零信任安全的概念、关键技术与核心架构进行了论述;随后,着重探讨了云网融合场景下引入零信任安全防护机制的必要性与实施路径;最后,总结了云网融合零信任安全研究面临的挑战,展望了未来的发展方向。 展开更多
关键词 云网融合 零信任安全 SD-WAN 云计算安全 安全访问服务边缘
在线阅读 下载PDF
基于Cloud Foundry云平台的网络考试系统实现
14
作者 丁振凡 《吉首大学学报(自然科学版)》 CAS 2013年第5期31-36,共6页
介绍了基于Cloud Foundry云平台的网络考试系统设计.在STS环境下通过添加"Cloud Foundry Integration"的扩展插件,开发者可通过虚拟机实现对Cloud Foundry云平台应用的可视化部署与管理.应用借助云服务可访问云上MySQL数据库... 介绍了基于Cloud Foundry云平台的网络考试系统设计.在STS环境下通过添加"Cloud Foundry Integration"的扩展插件,开发者可通过虚拟机实现对Cloud Foundry云平台应用的可视化部署与管理.应用借助云服务可访问云上MySQL数据库.重点围绕考试系统的组卷、试卷显示、交卷评分处理等环节,介绍了用Spring MVC框架设计相应的控制器、模型及视图显示的编程处理方法.系统采用Json串实现试卷信息在页面之间传递处理. 展开更多
关键词 cloud FOUNDRY 云数据库访问 考试系统 MVC开发模式
在线阅读 下载PDF
电气教学虚拟实验室云端权限访问控制方法
15
作者 林羽 《计算机应用文摘》 2026年第3期206-208,211,共4页
为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分... 为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分为近期行为与历史行为,实现动态更新,整体架构涵盖实验室配置、权限分配、资源访问及行为评估4个模块;在计算访问权限综合信任值时,对各类行为属性进行细粒度量化,通过逐层计算得到最终的综合信任评估结果;在权限控制环节,结合节点信任相似度计算、身份验证等多维因素,应用角色激活与权限分配机制实现动态、精准的权限调控。 展开更多
关键词 电气教学 虚拟实验室 云端访问结构 权限控制 用户信任值
在线阅读 下载PDF
支持分层访问控制的弱中心化敏感数据共享方案
16
作者 郑开发 孙炜 +4 位作者 周俊旭 吴云坤 徐振 刘志全 何强 《计算机科学》 北大核心 2026年第2期431-441,共11页
在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访... 在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访问控制的弱中心化敏感数据共享方案(HAC-SDS)。首先,通过云边端协同计算方式,将终端侧开销转移到云边侧,降低计算和存储开销。其次,通过构建加密的倒排索引,支持对云端文件进行快速、细粒度的检索,并结合属性撤销与动态更新机制,显著提升效率。最后,将区块链技术应用于密钥管理,通过其弱中心化的特性,从根本上消除传统中心化方案的单点瓶颈与信任风险。安全分析表明,密文的不可区分性有效保障了数据的机密性。实验结果表明,所提密文检索方案在实际应用中是高效可行的。 展开更多
关键词 分层访问控制 敏感数据共享 云边端协同计算 密文检索 弱中心化
在线阅读 下载PDF
云端移动应用的数据安全访问控制方法
17
作者 王利斌 胡鑫 王亚静 《移动信息》 2026年第2期89-91,共3页
云端移动应用在分布式环境下面临着复杂的数据安全访问控制挑战,而传统访问控制机制难以适应移动终端的多样性及网络环境的动态性要求。针对该问题,文中构建了一种分布式身份验证机制,通过细粒度权限管控算法建立了上下文感知访问决策模... 云端移动应用在分布式环境下面临着复杂的数据安全访问控制挑战,而传统访问控制机制难以适应移动终端的多样性及网络环境的动态性要求。针对该问题,文中构建了一种分布式身份验证机制,通过细粒度权限管控算法建立了上下文感知访问决策模型,并基于多层安全防护体系实现了访问控制性能的优化。实验表明,该方法能有效提升系统的安全防护能力,在保障移动应用正常运行的前提下显著增强了访问控制效果。 展开更多
关键词 云端移动应用 数据安全访问控制 分布式身份验证
在线阅读 下载PDF
基于5G技术的多接入点多云池混合接入方法与实践研究
18
作者 包永进 项朝霞 +1 位作者 李作林 任立刚 《信息通信技术与政策》 2026年第3期81-87,共7页
提出一种基于5G技术的多接入点多云池混合接入方法,通过构建主备网络架构,结合有线与软件定义广域网络叠加5G切片的主备切换机制,解决因新旧系统更迭与业务连续性要求产生的混合云接入难题。该方法聚焦主备链路秒级切换,业务分级保障机... 提出一种基于5G技术的多接入点多云池混合接入方法,通过构建主备网络架构,结合有线与软件定义广域网络叠加5G切片的主备切换机制,解决因新旧系统更迭与业务连续性要求产生的混合云接入难题。该方法聚焦主备链路秒级切换,业务分级保障机制实现多接入点与多云池的高效对接。经过实际测试验证,该方法在保障业务连续的前提下,可显著降低网络管理复杂度与运维成本,为网络高可靠场景的有效接入解决方案。 展开更多
关键词 多云池 混合接入 5G切片 SD-WAN
在线阅读 下载PDF
面向大规模异构设备的5G切片资源分配优化模型研究
19
作者 曾铮 周智睿 +2 位作者 徐杰 赵婷 陈家璘 《制造业自动化》 2026年第1期74-83,共10页
针对第五代移动通信系统云化无线接入网(Cloud Radio Access Network,C-RAN)中多业务共存时动态资源调度效率不足、差异化服务质量保障困难等问题,提出一种基于改进型双重Q学习(Enhanced Double Q-Learning,EDQL)的动态资源调度方法。首... 针对第五代移动通信系统云化无线接入网(Cloud Radio Access Network,C-RAN)中多业务共存时动态资源调度效率不足、差异化服务质量保障困难等问题,提出一种基于改进型双重Q学习(Enhanced Double Q-Learning,EDQL)的动态资源调度方法。首先,建立面向超可靠低时延通信(ultra-Reliable Low Latency communication,uRLLC)、增强型移动宽带(enhanced Mobile BroadBand,eMBB)与大规模机器类通信(massive Machine-Type Communication,mMTC)的虚拟化切片架构,通过多优先级抢占机制与队列动态调节因子实现资源权重自适应修正。在此基础上,设计融合竞争网络架构与动态奖励缩放的EDQL算法,结合马尔可夫决策过程对网络负载、信道状态及队列时延进行联合建模。实验结果表明,所提方法较传统轮询调度、静态优先级及启发式规则算法,uRLLC业务强制终止概率降低82.3%,eMBB服务完成率提升41.2%,系统资源利用率提升28.5%,mMTC平均排队时延减少76.9%。该研究通过虚拟化切片与强化学习的深度融合,为5G多业务资源调度提供了新范式。 展开更多
关键词 第五代移动通信 云化无线接入网 强化学习 虚拟化网络切片 调度 资源分配
在线阅读 下载PDF
STS实现Cloud Foundry云平台应用部署
20
作者 丁振凡 《井冈山大学学报(自然科学版)》 2013年第5期45-49,共5页
STS(Springsource Tool Suite)是Spring应用开发的一个强大工具,Cloud Foundry是Spring Source提供的一个开源云平台。在STS中通过添加Cloud Foundry扩展可支持云应用部署,对云平台上个人虚拟机的服务器及应用进行管理。分析了Cloud Fou... STS(Springsource Tool Suite)是Spring应用开发的一个强大工具,Cloud Foundry是Spring Source提供的一个开源云平台。在STS中通过添加Cloud Foundry扩展可支持云应用部署,对云平台上个人虚拟机的服务器及应用进行管理。分析了Cloud Foundry的架构组成,讨论了将Web应用部署到云环境的具体操作过程,重点针对云数据库访问、文档管理应用以及面向消息应用,分析了在云环境下编程要注意的问题。最后,给出了一个网络教学系统样例以及云应用部署的优劣分析。 展开更多
关键词 cloud FOUNDRY STS 云应用部署 云数据库访问
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部