期刊文献+
共找到3,530篇文章
< 1 2 177 >
每页显示 20 50 100
Constructions of Control Sequence Set for Hierarchical Access in Data Link Network
1
作者 Niu Xianhua Ma Jiabei +3 位作者 Zhou Enzhi Wang Yaoxuan Zeng Bosen Li Zhiping 《China Communications》 2026年第1期67-80,共14页
As an important resource in data link,time slots should be strategically allocated to enhance transmission efficiency and resist eavesdropping,especially considering the tremendous increase in the number of nodes and ... As an important resource in data link,time slots should be strategically allocated to enhance transmission efficiency and resist eavesdropping,especially considering the tremendous increase in the number of nodes and diverse communication needs.It is crucial to design control sequences with robust randomness and conflict-freeness to properly address differentiated access control in data link.In this paper,we propose a hierarchical access control scheme based on control sequences to achieve high utilization of time slots and differentiated access control.A theoretical bound of the hierarchical control sequence set is derived to characterize the constraints on the parameters of the sequence set.Moreover,two classes of optimal hierarchical control sequence sets satisfying the theoretical bound are constructed,both of which enable the scheme to achieve maximum utilization of time slots.Compared with the fixed time slot allocation scheme,our scheme reduces the symbol error rate by up to 9%,which indicates a significant improvement in anti-interference and eavesdropping capabilities. 展开更多
关键词 control sequence data link hierarchical access control theoretical bound
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
2
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
3
作者 Shenjian Xiao Xiaoli Qin +1 位作者 Yanzhao Tian Zhongkai Dang 《Computers, Materials & Continua》 2025年第5期2351-2373,共23页
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions. 展开更多
关键词 Multi-authority attribute based encryption blockchain data sharing access control
在线阅读 下载PDF
基于Access的电子健康记录管理数据库设计
4
作者 欧雪山 《计算机应用文摘》 2026年第3期143-145,共3页
随着信息技术的飞速发展,电子健康记录系统已成为现代医疗体系的重要基础设施,其核心功能是实现患者健康信息的系统化、高效化管理。文章以Microsoft Access数据库为基础,设计并实现了一套电子健康记录管理数据库系统。借助Access平台... 随着信息技术的飞速发展,电子健康记录系统已成为现代医疗体系的重要基础设施,其核心功能是实现患者健康信息的系统化、高效化管理。文章以Microsoft Access数据库为基础,设计并实现了一套电子健康记录管理数据库系统。借助Access平台在数据建模、界面开发与查询统计方面的灵活性优势,构建了覆盖患者基本信息、病历记录、检查结果及用药信息等核心模块的集成化管理平台。系统通过规范化的表结构设计、关系建立及窗体查询功能,支持多维度数据检索与统计分析,有效提升了患者信息管理工作的准确性和效率。实际应用表明,该系统能够显著减少人工录入错误与重复操作,为临床决策及机构管理提供及时、可靠的数据支持。 展开更多
关键词 电子健康记录 Microsoft access 数据库设计 医疗信息管理 数据查询与统计
在线阅读 下载PDF
Development of a risk index for cross-border data movement 被引量:5
5
作者 Jin Li Wanting Dong +1 位作者 Chong Zhang Zihan Zhuo 《Data Science and Management》 2022年第3期97-104,共8页
Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security asses... Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data. 展开更多
关键词 cross-border data data security Biomedical data Risk assessment data management
在线阅读 下载PDF
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
6
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
原文传递
Application of Big Data Analysis Technology in Cross-Border E-Commerce
7
作者 Yanan Song 《Journal of Electronic Research and Application》 2021年第4期1-3,共3页
Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the ... Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the influence of international trade.Based on big data technology,this paper builds an industry chain with cross-border e-commerce members'participation,and analyzes the specific application of big data in the product support,internal operation,external marketing,logistics service and service evaluation of cross-border e-commerce industry chain.The purpose is to effectively promote the healthy development of cross-border e-commerce and improve China's trade and economic level. 展开更多
关键词 Big data cross-border e-commerce E-COMMERCE
在线阅读 下载PDF
基于Data Access规范的OPC Server的研究与实现 被引量:2
8
作者 周强 杨明极 +1 位作者 沈辉 郭剑虹 《哈尔滨理工大学学报》 CAS 2007年第2期107-109,113,共4页
为了实现OPC数据存取服务器,依据OPC数据存取2.05a技术规范,采用了ATL技术,建立了OPC数据存取服务器的结构模型,实现了OPC数据存取服务器的构建及OPC数据存取服务器的主要功能.
关键词 OPC 数据存取 ATL
在线阅读 下载PDF
应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法及其比较 被引量:1
9
作者 吴东宁 何丽云 +3 位作者 王鑫 艾艳柯 文天才 吕晓颖 《中国卫生产业》 2016年第19期18-20,共3页
目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用A... 目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用Access,Epi Data软件建设胸痹心痛临床研究数据库的共同特点为:占用空间较小,界面友好,直观性强,简单易学,操作方便,可以较好的服务于数据管理;区别主要在于费用、存储空间、自动保存、网络功能、管理权限和导出格式等方面。结论应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法简单、实用,对于我国现阶段一般的中医药临床研究比较适用,也很适合临床单位中以科室或医生个人为主体开展的研究使用,且对于数据管理的普及、规范和进步有重要意义。 展开更多
关键词 access EPI data 胸痹心痛 数据库
暂未订购
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
10
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
Measuring accessibility of bus system based on multi-source traffic data 被引量:3
11
作者 Yufan Zuo Zhiyuan Liu Xiao Fu 《Geo-Spatial Information Science》 SCIE CSCD 2020年第3期248-257,I0005,共11页
Accessibility is a representative indicator for evaluating the supply of bus system.Traditional studies have evaluated the accessibility from different aspects.Considering the interaction among land use,bus timetable ... Accessibility is a representative indicator for evaluating the supply of bus system.Traditional studies have evaluated the accessibility from different aspects.Considering the interaction among land use,bus timetable arrangement and individual factors,a more holistic accessibility measurement is proposed to combine static and dynamic characteristics from multisource traffic data.The rationale of the proposed model is verified by a case study of bus system in Shenzhen,China,which is carried out to find the spatial and temporal discrepancy of service of bus system.It is found that the adjustment of bus schedule to time-varying travel demand can affect accessibility of bus system and that Land-use development,average bus speed and bus facilities all have positive effects on accessibility of bus system.These findings provide sig-nificant reference for transport planning and policy-making.The proposed model is not limited to accessibility measuring of bus system,but also applicable to other travel modes. 展开更多
关键词 accessIBILITY bus system multi-source traffic data spatial-temporal distribution
原文传递
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
12
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named data networking INTEREST aggregation multipath FORWARDING data access FAILURE negative ACKNOWLEDGEMENT
在线阅读 下载PDF
Measuring positive public transit accessibility using big transit data 被引量:3
13
作者 Tong Zhang Wenyuan Zhang Zhenxuan He 《Geo-Spatial Information Science》 SCIE EI CSCD 2021年第4期722-741,共20页
Most of the current existing accessibility measures quantify the potential of reaching desirable opportunities across space and time.Nevertheless,these potential measurements only illus-trate the maximum possible acce... Most of the current existing accessibility measures quantify the potential of reaching desirable opportunities across space and time.Nevertheless,these potential measurements only illus-trate the maximum possible accessibility a person can have,which may not accurately measure real-world transit accessibility in urban areas.This paper introduces a novel methodology to measure positive public transit accessibility based on multi-source big public transit data such as Smart Card Data(SCD)and Global Navigation Satellite System trajectory data,which embed rich travel information and real-world spatio-temporal constraints.First,we use multi-source transit data to reconstruct trip chains,which are used to extract popular destinations.A novel transit accessibility measure is defined to account for latent trip information such as mode/route preference,opportunity attraction,and travel impedance that are difficult to capture explicitly via traditional normative measures.Finally,we produce accessibility maps to visualize time-varying and heterogeneous accessibility patterns distributed over the study region.We performed an empirical evaluation on real-world transit data collected in Shenzhen City,China,demonstrating the applicability and effectiveness of the proposed method in mapping positive transit accessibility over large metropolitan areas.The results and findings of the empirical study demonstrate that the proposed positive accessibility measure can better capture travel behavior characteristics and constraints than traditional normative measures.The measure-ment method can be used as a practical high-resolution mapping tool for transit decision makers in evaluating public transit systems,supporting strategic transit planning,and improv-ing daily transit management. 展开更多
关键词 Public transit positive accessibility smart card data SPATIO-TEMPORAL
原文传递
Security and Privacy Frameworks for Access Control Big Data Systems 被引量:3
14
作者 Paolina Centonze 《Computers, Materials & Continua》 SCIE EI 2019年第5期361-374,共14页
In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have t... In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework. 展开更多
关键词 Big data access control distributed systems SECURITY PRIVACY
在线阅读 下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:3
15
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing Internet of Things
在线阅读 下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:2
16
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things 被引量:1
17
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power Internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
在线阅读 下载PDF
上一页 1 2 177 下一页 到第
使用帮助 返回顶部