期刊文献+
共找到578篇文章
< 1 2 29 >
每页显示 20 50 100
Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’Propensity of Live-Streaming:An Extended TAM Method 被引量:9
1
作者 Donghui Li Guozheng Zhang +4 位作者 Zeng Xu Yong Lan Yongdong Shi Zhiyao Liang Haiwen Chen 《Computers, Materials & Continua》 SCIE EI 2018年第4期137-150,共14页
Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from t... Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from that of other e-commerce areas.There are two major dimensions of trust in the live streaming context:platform trust and cewebrity trust,which are both important for customers to adopt and reuse a specific live streaming service.We collected questionnaire data from 520 participates who have used live streaming services in China.We model the collected data and identified factors that can influence users’propensity by an extended technology acceptance model(TAM)method.According to our analysis,both cewebrity trust and platform trust will greatly influence users’intention to reuse a certain platform.Moreover,results also indicate that cewebrity trust is far more important than platform trust.These findings can lead to several management strategies to improve the adherence of users to streaming platforms. 展开更多
关键词 Live streaming extended TAM approach consumers’propensity cewebrity trust platform trust
暂未订购
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
2
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
在线阅读 下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
3
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL
在线阅读 下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
4
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM trusted platform module) trusted virtualization configuration representation configuration management
在线阅读 下载PDF
Merkle Tree Digital Signature and Trusted Computing Platform 被引量:1
5
作者 WANG Xiaofei HONG Fan TANG Xueming CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1467-1472,共6页
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios. 展开更多
关键词 digital signature one-time signature Merkle tree trusted computing platform
在线阅读 下载PDF
基于Trustzone的强安全需求环境下可信代码执行方案 被引量:23
6
作者 张英骏 冯登国 +1 位作者 秦宇 杨波 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2224-2238,共15页
针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控... 针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控模块无法被不可信内核篡改或绕过.以此为基础为可信进程提供可执行文件完整性、运行时代码完整性、控制流完整性3种层次的白名单保护,确保设备只能执行符合白名单策略的授权代码.通过构建通信客户端进程与Trustzone安全世界的安全共享内存区,利用Trustzone对外设中断事件的控制能力构建可信时钟中断源,确保Trustzone安全世界与中控服务器通信的隐私性、不可屏蔽性.在此基础上设计安全的白名单更新与平台状态证明协议.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率. 展开更多
关键词 白名单 可信代码执行 trustzone技术 可信执行环境 内核飞地 平台状态证明
在线阅读 下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
7
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
在线阅读 下载PDF
Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3
8
作者 SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of truste... Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 展开更多
关键词 operating system trusted path trusted platform module (TPM) trusted software
在线阅读 下载PDF
An Improved Grid Security Infrastructure by Trusted Computing 被引量:3
9
作者 YAN Fei ZHANG Huanguo +3 位作者 SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ... Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 展开更多
关键词 trusted computing grid computing grid security trusted platform module
在线阅读 下载PDF
Modeling Trusted Computing 被引量:3
10
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
Cyber-Physical-Social System Between a Humanoid Robot and a Virtual Human Through a Shared Platform for Adaptive Agent Ecology 被引量:3
11
作者 S. M. Mizanoor Rahman 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期190-203,共14页
Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physica... Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system(CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate(assist each other) to perform a real-world task(search for a hidden object)for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS.The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS. 展开更多
关键词 Adaptive agent ecology assisted living cyberphysical-social system(CPSS) humanoid robot(HR) smart homes social interaction virtual human(VH) shared platform trust
在线阅读 下载PDF
Architecture of Trusted PC
12
作者 WU Shuhua ZHU Yuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1433-1436,共4页
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware ... This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming. 展开更多
关键词 ARCHITECTURE trusted PC trusted platform
在线阅读 下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
13
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can for... Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can forge proof of inexistent system states.This paper proposes a trustworthy integrity measurement architecture,BBACIMA,through enforcing behavior-based access control for trusted platform module(TPM).BBACIMA introduces a TPM reference monitor(TPMRM)to ensure the trustworthiness of integrity measurement.TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious.TPMRM is the only entity manipulating TPM directly and all PCR(platform configuration register)operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states.Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module(TPM) trusted computing remoteattestation
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
14
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform
原文传递
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
15
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 Root of trust(RoT) trusted platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
在线阅读 下载PDF
A Trusted Smart Phone and Its Applications in Electronic Payment
16
作者 Chang-Ying Zhou Chun-Ru Zhang 《Journal of Electronic Science and Technology of China》 2007年第3期206-211,共6页
With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applica... With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case, the banking systems) poses obstacles to their widespread presence in mobile services. Recently, the exposure of hacking of iPhone and other smart phones further emphasizes the criticality of establishing a trust platform for mobile applications. This paper analyzes the building blocks of the trusted smart phone, and proposes a framework to provide a trusted platform for mobile electronic payment. Such a proposed system may allow direct interface to the banking systems due to the banking industry recognized strong security, and hence, may enable its widespread use. 展开更多
关键词 Mobile electronic payment trusted computing trusted platform module.
在线阅读 下载PDF
基于SOR理论的患者线上医疗平台使用行为研究
17
作者 戴璟 张晓龙 +2 位作者 何璇 龚颖娜 杨云娟 《中国卫生事业管理》 北大核心 2025年第7期740-745,共6页
目的:分析影响患者线上医疗平台择医行为的关键因素,为促进线上医疗平台可持续发展提供决策参考。方法:基于SOR理论与信任源理论构建研究框架,选取技术信任、问诊价格、善意信任、诚实信任、声誉信任及感知信任六个维度,采用多元回归分... 目的:分析影响患者线上医疗平台择医行为的关键因素,为促进线上医疗平台可持续发展提供决策参考。方法:基于SOR理论与信任源理论构建研究框架,选取技术信任、问诊价格、善意信任、诚实信任、声誉信任及感知信任六个维度,采用多元回归分析和bootstrap方法对模型进行验证。结果:研究发现技术信任维度中的医生总患者数(β=0.467,P<0.01)和病友推荐度(β=1.652,P<0.01)对择医行为具有显著正向影响,同时问诊价格(β=0.122,P<0.01)和开通线下预约挂号(β=0.346,P<0.01)也显著影响患者择医决策;荣誉称号(β=0.154,P<0.1)则通过感知信任的完全中介作用影响择医行为,且这种影响存在患者风险特征的调节效应,即高疾病风险患者更依赖问诊价格,而低疾病风险患者更重视荣誉称号;进一步的异质性分析表明,资深医生(≥11年)的病友推荐度和线下预约功能影响更大,而新进医生(<11年)的总患者数和问诊价格影响更显著。结论:建议从优化信号指标体系、发展智能推荐系统、强化多层次信任建设和注重患者情感体验等方面入手,提升线上医疗平台服务质量,促进医疗资源可及性改善。 展开更多
关键词 线上医疗平台 信任 SOR理论 中介效应
暂未订购
面向RISC-V平台的安全高效固件可信平台模块设计与实现
18
作者 王杰 王鹃 《电子与信息学报》 北大核心 2025年第7期2385-2395,共11页
可信平台模块(TPM)作为提升系统安全性的核心技术,能够提供基于硬件的密钥管理、可信启动和远程认证等安全功能。然而,当前RISC-V平台普遍缺乏TPM支持,限制了其在嵌入式和云计算场景中的安全能力。为解决这一问题,该文设计并实现了RfTP... 可信平台模块(TPM)作为提升系统安全性的核心技术,能够提供基于硬件的密钥管理、可信启动和远程认证等安全功能。然而,当前RISC-V平台普遍缺乏TPM支持,限制了其在嵌入式和云计算场景中的安全能力。为解决这一问题,该文设计并实现了RfTPM——一种面向RISC-V平台的固件可信平台模块(fTPM)架构,无需额外硬件单元或安全扩展即可提供等效的安全功能。针对执行隔离、可信启动、高效通信和安全时钟等关键挑战,在RfTPM中,该文提出了创新解决方案,包括:基于RISC-V物理内存保护(PMP)机制的内存隔离以及结合DRAM物理不可克隆函数(PUF)与Flash锁定的静态数据保护、基于延迟度量扩展的可信启动机制、基于动态权限交换页的高效通信机制以及基于RISC-V硬件计时器的细粒度安全时钟。该文构建了RfTPM的原型系统,对其进行了安全性分析并在Genesys2 FPGA平台模拟的Rocket Core上进行了性能测试。实验结果表明,RfTPM在保证安全性的同时在大多数TPM命令处理中有比较显著的性能优势。 展开更多
关键词 可信平台模块 固件可信平台模块 RISC-V 可信启动
在线阅读 下载PDF
数字能力对农户采纳保护性耕作技术的影响 被引量:1
19
作者 闫小欢 张浩楠 《西部论坛》 北大核心 2025年第5期16-29,共14页
农户的数字能力增强不仅能降低其采纳保护性耕作技术的门槛和成本以及市场风险,还能提高其采纳保护性耕作技术的预期收益。采用2020—2023年在陕西和甘肃两省抽样调查的1 633份问卷数据,从数字技术接入、数字平台使用和数字信息获取3个... 农户的数字能力增强不仅能降低其采纳保护性耕作技术的门槛和成本以及市场风险,还能提高其采纳保护性耕作技术的预期收益。采用2020—2023年在陕西和甘肃两省抽样调查的1 633份问卷数据,从数字技术接入、数字平台使用和数字信息获取3个维度评价农户的数字能力,运用Ordered Probit模型分析发现:农户的数字能力增强显著促进了其采纳保护性耕作技术;数字能力增强能够通过提升农户的绿色生产认知、降低农户的信息获取难度、提高农户的社会信任程度3条路径促进农户采纳保护性耕作技术;随着户主学历的提高、种植面积的减小、县域互联网普及率的提高,数字能力增强对农户采纳保护性耕作技术的促进作用逐渐加大;相比家庭农业收入占比较低的农户,数字能力增强对农业收入占比较高农户采纳保护性耕作技术具有更显著的促进作用。因此,应不断提升农户的数字能力,提高农户的绿色生产认知,完善农村数字基础设施,加快农村数字化发展,有效促进农户积极采纳保护性耕作技术。 展开更多
关键词 数字能力 保护性耕作技术 绿色生产认知 信息获取 社会信任 数字平台
在线阅读 下载PDF
平台自我优待的反垄断规制
20
作者 秦康美 许湘怡 《淮南师范学院学报》 2025年第2期1-7,共7页
平台自我优待是否合法在我国尚无定论。目前,搭售、拒绝交易、差别待遇等规则难以涵摄平台自我优待,凭借事后适用兜底性条款无法判断平台自我优待是否需要规制,导致执法司法自由裁量幅度较大。自我优待并非本身违法,应从发展与限制两个... 平台自我优待是否合法在我国尚无定论。目前,搭售、拒绝交易、差别待遇等规则难以涵摄平台自我优待,凭借事后适用兜底性条款无法判断平台自我优待是否需要规制,导致执法司法自由裁量幅度较大。自我优待并非本身违法,应从发展与限制两个角度规范自我优待行为。为激发平台创新活力,执法机关应当以发展为导向,从事前监管的角度引导平台围绕严格说明、数据回馈、限制时长三个维度合理实施自我优待;事后执法应当以限制为导向,在反垄断法框架下着重分析正当性理由,以创新要素、经营者对平台的依赖程度、平台的自我优待时间为考察要点。 展开更多
关键词 平台经济 自我优待 反垄断 市场支配地位 竞争损害
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部