排序方式: 共有35条查询结果,搜索用时 0 毫秒
11.
略论我国西部地区高职教育的人才培养模式 总被引:2,自引:0,他引:2
简介我国西部地区人才短缺现状,分析其原因,结合西部特点,指出西部高职教育应着重培养特色型、守业型、创业型3种人才。然后就西部高职教育的发展方向、深化改革、高职教育与职业资格等问题进行了探讨。 相似文献
12.
We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS communications provide a sufficient communication platform for this electronic wallet architecture. However, new security requirements must be addressed, and new threats of attack must be carefully analyzed and met with appropriate security protocols. The proposed approach is fundamentally distinct from the remote wallet proposals, in that it protects important user requirements and takes a multiparty security approach using a fully decentralized architecture. Technically, the user remains in control of the input/output and usage of his credentials, likely carried by smart cards. At the same time, the model provides a solution to the pressing practical problem of the multitude of special-branded cards the user has to carry and sort. Currently used magnetic stripe and chip cards with applications such as debit and credit transactions are easily included within the architecture with minor enhancement to these legacy systems and their functionality. We show in this paper how an account-based payment system can be solved with the proposed architecture. Our claim is that users achieve payment mobility and independence of both terminals and payment service providers while maintaining secure access to their payment authorization credentials. 相似文献
13.
O2O是电子商务发展到一定阶段涌现出的一种新的网络购物模式,O2O这种新兴的网络购物模式与传统的电子商务环境一样存在着安全问题,主要集中在用户身份伪造、交易抵赖及非法数据修改、交易信息泄露等场景。安全保障手段包括防火墙、加解密、基于PKI/CA的数字证书、打造端到端的身份认证及业务鉴权环境等,这些是O2O电子商务可信交易环境安全体系的组成部分,需要从计算机与网络安全、O2O交易中数据安全两方面着手搭建安全体系。 相似文献
14.
15.
针对自动信任协商中分布式存储的信任证查找算法效率低下的问题,本文提出一种贪婪算法和双向查找算法相结合的信任证链查找算法,并通过控制信任证图生成的方向和限制信任证链查找时生成信任证图的大小来进一步提高查找的效率.仿真结果表明该算法生成的信任证图比其它算法生成的信任证图平均要小3%左右,在查找相同的信任证的情况下,改进算法的效率和其它算法相比提高了5%左右. 相似文献
16.
信任凭证的存储策略是信任管理领域中广受关注的一个研究内容,它直接影响到凭证的收集、撤销和凭证链的构造等问题。针对RT0信任管理模型,提出了一种基于2D-CAN网络(2-dimensions Content Addressable Network)的信任凭证存储策略,通过<发行者,主体>的二维信息,将信任凭证映射存储到二维CAN协议的对应节点上,从而实现凭证的分布式存储,并提供灵活地查询。同时,研究提出了一个基于凭证图双向生长的信任链发现算法。实验表明,基于2D-CAN协议的凭证存储算法,能达到较高的鲁棒性和查询效率。 相似文献
17.
This article poses the question of whether specialty board certification in psychology is truly necessary. The article reviews the basic tenets of board certification and why it should become a requirement beyond the level of independent state or provincial licensing. In addition, the article presents some of the reasons why psychologists may have been reluctant to pursue board certification, as well as some of the pitfalls encountered in the process of becoming certified. Further discussion illuminates the need for psychologists to adhere to rigid requirements for credentialing and not to become prey to ersatz or so-called vanity boards. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
18.
19.
匿名凭证作为一种隐私保护的数字身份认证技术, 在认证用户数字身份有效性的同时, 能够保护用户身份隐私, 广泛应用于匿名身份认证、匿名通证、去中心化的数字身份管理系统等. 现有的匿名凭证通常采用承诺-签名-证明的构造范式, 通常要求采用的签名算法具备重随机化特性, 如CL系列签名、PS系列签名及结构保持签名. 现实应用中多采用ECDSA、Schnorr、SM2等数字签名进行数字身份认证, 但其缺乏对用户身份隐私的保护. 因此, 在认证的同时, 保护身份的隐私性, 构造兼容ECDSA、Schnorr、SM2等数字签名的匿名凭证具有一定的现实意义. 探索基于SM2数字签名构造匿名凭证协议的方法. 在申请证书阶段, 借助Pedersen承诺对用户属性进行承诺, 同时依据SM2签名消息为$ H(m) $的结构特点, 证明Pedersen承诺消息与哈希承诺中消息的相等性. 为实现这种代数结构和非代数结构陈述的等价性证明, 借鉴ZKB++技术对承诺消息进行转化, 进而实现跨域证明, 并签发基于SM2数字签名的授权证书. 在匿名凭证展示阶段, 结合零知识证明技术证明持有SM2数字签名, 保证了用户的匿名性. 给出基于SM2数字签名的匿名凭证协议的具体构造, 并进一步证明该协议的安全性. 最后, 通过对协议的计算复杂度分析与算法执行效率测试验证协议的有效性和可用性. 相似文献
20.
构建适宜于清洁能源消纳的现货市场是当前我国电力市场的建设重点,提出一种含双边储备市场及绿证交易的现货市场交易机制。首先,引入促进风电并网交易的绿色证书交易机制。结合当前国内清洁能源市场形势,提出绿证强制交易配额制度,确定绿色证书交易数额及定价模型。其次,为减少风电因投标偏差产生的高额考核费用,引入风电商参与购售电交易的双边储备市场。在该市场机制下,火电商作为交易电量的提供者与风电商进行购售博弈。采用古诺模型和鲁宾斯坦模型相结合后的变形模型,对双边储备市场的交易电量和交易电价进行求解。然后,通过蒙特卡洛模拟和场景缩减技术模拟风电的实际出力,代入函数模型对发电商的利润进行求解。仿真结果表明,同时参与日前市场与双边储备市场进行交易的风电商可以合理规避偏差惩罚,同时各个发电商的购售利润均有提升,验证了所提模型的合理性和有效性。 相似文献