Showing 1-25 of 3,167 resultsfor

Filter Results

Show

Results

According to primary performance status of public policy implementation in China, this paper researches performance evaluation from two aspects (positive and negative) in macroscopic environment. System dynamics method is adopted to explain the mechanism of these two kinds of effects on our public policy implementation. By computer simulation, the core execution of public policy has constructed th...Show More

Reasoning about delegation and revocation schemes in answer set programming

;;;

Journal of Logic and Computation
Year: 2014 | Volume: 24, Issue: 1 | Journal Article |
Cited by: Papers (1)
In this article we show how to model a range of notions in the context of delegation and revocation applied to security scenarios. We demonstrate how a range of delegation–revocation models and policies may be represented in pictorial form and formally represented in terms of reactive Kripke models and a first-order policy specification language. We translate first-order representations of our rea...Show More

Reasoning about delegation and revocation schemes in answer set programming

;;;

Year: 2014 | Volume: 24, Issue: 1 | Journal Article |
Policy plays a significant role as a special factor in the current development of China's AI industry. This paper selects 27 representative policy documents on AI large models from various provinces and cities across China for study. Through the use of Bertopic and LDA models, analyses are conducted based on word frequency, policy semantics, theme characteristics, and policy similarity. The resear...Show More
Attribute-Based Encryption (ABE) has been caught a wide range of attention owing to its advantage of achieving both fine-grained access control and protection for data. In recent years, the constructions of ABE have developed to lattice-based schemes, while most of them exist bottlenecks in efficiency and security as a result of constructing on the Learning With Errors (LWE) assumption and relying...Show More
This article describes a privacy policy framework that can represent and reason about complex privacy policies. By using a Common Data Model together with a formal shareability theory, this framework enables the specification of expressive policies in a concise way without burdening the user with technical details of the underlying formalism. We also build a privacy policy decision engine that imp...Show More
Based on the key-policy attribute-based encryption (KP-ABE), combined with the idea of hierarchical ID-Based encryption (HIBE), a hierarchical authority key-policy attribute-based encryption (HA-KP-ABE) scheme is presented. The new scheme uses hierarchical multi-authority to distribute private keys to users. It can not only relieve the burden with a single authority but also avoid the potential sa...Show More
Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not sol...Show More
This paper constructs a nonstationary DSGE model with money supply mechanism in a new Keynesian framework. Based on the Bayesian estimation of model's parameters and policy loss function, we analyze the optimal combination issues of fiscal and monetary policy. The results indicate that in terms of policy loss function, the optimal combination policy would dominate separate optimal fiscal or optima...Show More
Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption acce...Show More
Ciphertext-policy Attributes-based Encryption (CP-ABE) is an encouraging cryptographic mechanism. It behaves an access control mechanism for data security. A ciphertext and secret key of user are dependent upon attributes. As a nature of CP-ABE, the data owner defines access policy before encrypting plaintext by his right. Therefore, CP-ABE is suitable in a real environment. In CP-ABE, the revocat...Show More
We propose a novel framework for outsourced private function evaluation with privacy policy enforcement (OPFE-PPE). Suppose an evaluator evaluates a function with private data contributed by a data contributor, and a client obtains the result of the evaluation. OPFE-PPE enables a data contributor to enforce two different kinds of privacy policies to the process of function evaluation: evaluator po...Show More
Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessi...Show More
As big data technologies develop, data retrieval and analysis has become an important research topic recently. This paper designs and implements a data retrieval and analysis platform based on elastic search. On the one hand, the system can store and search policy big data efficiently and reliably, and index data with real-time performance. On the other hand, policy big data has its own characteri...Show More

PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination

;;;;

Tsinghua Science and Technology
Year: 2022 | Volume: 27, Issue: 4 | Journal Article |
Cited by: Papers (4)
Government policy-group integration and policy-chain inference are significant to the execution of strategies in current Chinese society. Specifically, the coordination of hierarchical policies implemented among government departments is one of the key challenges to rural revitalization. In recent years, various well-established quantitative methods have been proposed to evaluate policy coordinati...Show More

PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination

;;;;

Year: 2022 | Volume: 27, Issue: 4 | Journal Article |
Based on the analysis of the concept and the present situation of the science and technology service industry, using game theory related principles and methods to establish science and technology service industry and local government as the main body of the behavior of the game model, trying to analyze the reason and principle of the government in promoting the development of science and technolog...Show More
This article takes the real estate as the object of study, uses the theoretical analysis and the empirical analysis unifying the research technique, including qualitative and the quantitative analysis in the union real estate industry characteristic and real estate macroeconomic regulation and control process physical demand, carries on a more complete analysis to our country real estate macroecon...Show More
This standard defines a vendor-independent set of policy-based control architectures and corresponding policy language requirements for managing the functionality and behavior of dynamic spectrum access networks.Show More
This standard defines a vendor-independent set of policy-based control architectures and corresponding policy language requirements for managing the functionality and behavior of dynamic spectrum access networks.Show More
When monetary authority and fiscal authority make their decisions independently, either tries to maximize the overall welfare level subject to the implementation condition and resource constraint. After extending both the objective function and constraints to 2nd order around the steady states, this nonlinear optimal problem is transformed into a pure linear quadratic one. Under this framework we ...Show More
In mobile social networks, to guarantee the security and privacy in the friend discovery process, we propose a hierarchical multi-authority and attribute-based encryption (ABE) friend discovery scheme based on ciphertext-policy (CP)-ABE. It employs character attribute subsets to achieve flexible fine-grained access control, which solves the problem of single-point failure and performance bottlenec...Show More
Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messagi...Show More
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party. It is expected that commanders could control whether the user can decrypt the ciphertext or not. Besides, it is essential that a key authority dis...Show More
Multi authority attribute based encryption solve a completely trust problem about a single authorization center, make the data owner control fine-grained data and resist collusion attack. But in the practical attribute revocation needs a lot of calculation. Adding the user revocation list into cipher text implements the user revocation. Through agent re-encryption technology, decryption outsourcin...Show More
Environmental policy implementation is an important part of environmental protection and the realization of the ecological civilization depends on the effective environmental policy implementation. However, some problems exist, such as the poor environmental protection awareness of government and citizens, poor executive means and so on. Therefore, this paper, based on ecological theory, tends to ...Show More
Promoting the development of renewable energy has become a common goal of the international world. With the rapid development of China's Photovoltaic (PV) industry, the disputes over China's PV industrial policies have been intensified. Although government's policy changes ensured China's PV industry surviving from the sanctions implemented by the previous trade disputes, severe problems remain in...Show More