Resource Type

Journal Article 491

Year

2024 1

2023 50

2022 41

2021 59

2020 31

2019 35

2018 27

2017 40

2016 48

2015 28

2014 18

2013 15

2012 11

2011 8

2010 10

2009 10

2008 7

2007 14

2006 5

2005 5

open ︾

Keywords

food security 39

energy security 19

China 11

public health 9

sustainable development 7

development strategy 6

cyberspace security 5

security 5

COVID-19 4

Physical layer security 4

cyberspace 4

sustainability 4

water security 4

Network security 3

Security 3

emergency management 3

industrial Internet security 3

system construction 3

Air pollution 2

open ︾

Search scope:

排序: Display mode:

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedFinally, the development of the industrial Internet security public service is prospected from the aspectsof intelligent security service, integrated public service platform, and new generation information

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Frontiers of Engineering Management 2015, Volume 2, Issue 4,   Pages 331-338 doi: 10.15302/J-FEM-2015063

Abstract: The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditionalFor the new adapted requirements of public security management, this paper puts forward the concept ofsecurity management.security.

Keywords: public security     routine management     emergency management     coordinated management    

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 234-239 doi: 10.1007/s11709-007-0029-8

Abstract: In retrospect of the architecture design of Exit-Entry Administration Building of Shanghai Municipal PublicSecurity Bureau, this paper elaborates on the architect s pursuit of the symbol of the image, the fluidity

Keywords: commonness     retrospect     sequence     architecture individuality     architect    

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Strategic Study of CAE 2017, Volume 19, Issue 6,   Pages 44-51 doi: 10.15302/J-SSCAE-2017.06.007

Abstract: Based on these analyses, countermeasures guaranteeing the long-life security of underwater tunnel structuresThese countermeasures are being sought to effectively protect and ensure the service performance of theThese security measures can ensure the safe performance of the structure during its entire life cycle, even under long service times.This research can serve as a reference for enhancing the structural security of underwater tunnels and

Keywords: underwater tunnels     service security     security guarantee countermeasures     long life     structural defects    

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 56-59

Abstract:

The security problem, such as network security, user data protection,authentication, mobile management and network services are becoming more and more important in PublicThis paper focuses on the design research of the PWLAN security architecture.A security model based on access controller is proposed in this paper.authentication scheme is provided to ensures cryptographically protected access while preserving pre-existing public

Keywords: public WLAN     security architecture     authentication     access controller    

Modernization of Public Service Governance in Rural Areas of China

Ma Chen,Li Jin,Zhao Chunjiang,Zhang Qian,Sun Ning,Song Taichun,Feng Xian,Cao Bingxue

Strategic Study of CAE 2022, Volume 24, Issue 2,   Pages 160-169 doi: 10.15302/J-SSCAE-2022.02.017

Abstract:

The modernization of public service governance in rural areas is a crucialBased on an investigation regarding rural public service governance in 22 provinces (cities and autonomousregions) in China, we summarize the historical evolution and institutional changes of the public serviceMultiple problems remain in terms of public education, health care, social security, employment traininghealth service system, and (5) improving the social security system in rural areas.

Keywords: public service governance     rural modernization     rural governance     co-governance     coordinated development    

Analysis of Scientific and Technological Issues and Resear chof Development Strategy Plan on China’s PublicSecurity

He Ping,Mi Jia,Yin Weiwei

Strategic Study of CAE 2007, Volume 9, Issue 4,   Pages 35-40

Abstract:

On the basis of providing the definition of public security system, thispaper puts forward the concept of public security comprehensive index, discusses the characteristicsBased on the security index, it provides the index of public security control ability and discusses theStudies have shown that the scientific and technological contribution rate of public security is theThis paper also sets up the function between science and technology input and public security target,

Keywords: public security     running system     comprehensive index     scientific and technologicalcontribution rate    

Servitization Development Strategy on Manufacturing

The Research Group for Servitization Development Strategy on Manufacturing

Strategic Study of CAE 2015, Volume 17, Issue 7,   Pages 29-31

Abstract: manufacturing and developing the manufacture-related service industry.To 2025, in order to make a manufacturing power, China should build the global service-oriented manufacturingbase and global manufacturing service outsourcing center.At the same time, the service-oriented manufacturing and manufacture-related service industry will beintegrated to a powerful modern service-oriented manufacturing industries.

Keywords: service-oriented manufacturing     manufacture-related service industry     development strategy    

Construction and Issues Related to the First Phase Project of Dust-storm Monitoring, Predicting and Service

Wang Xuechen,Cheng Lei

Strategic Study of CAE 2004, Volume 6, Issue 3,   Pages 64-67

Abstract: Enhancing the abilities of dust-storm monitoring, predicting and service will be of great benefit toAt present, the comprehensive operation on dust-storm monitoring, predicting and service is still inmeet the needs of implementing the real-time and quantitative monitoring and providing the efficient serviceThe implementing of the first phase project of dust-storm monitoring, predicting and service system willThe first phase project mainly involves monitoring subsystem, predicting, warning and service subsystem

Keywords: dust-storm     monitoring and predicting and service system     project construction     issues of extensive ability    

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Strategic Study of CAE 2021, Volume 23, Issue 5,   Pages 41-50 doi: 10.15302/J-SSCAE-2021.05.006

Abstract: Strengthening research on the coordination of public health security emergency information and buildingefficient and credible emergency information sharing system have become the core issues to optimize the publichealth security information management in China.This study analyzes the structure and connotations of public health security emergency information andThis study is expected to provide a decision-making reference and feasible path for building a new public

Keywords: COVID-19 pandemic     public health security     emergency information     sharing     consortium blockchain    

The Current Situation and Development of Health Management in China

Li Jiang,Tao Sha,Li Ming,Fu Hua,Wang Ke’an,Tian Chuansheng and Wang Longde

Strategic Study of CAE 2017, Volume 19, Issue 2,   Pages 8-15 doi: 10.15302/J-SSCAE-2017.02.002

Abstract: typical organizations from Jiangsu, Zhejiang, and Shanghai to investigate, including community health servicecenters, enterprises, health insurance companies, and health management service companies.study indicate that China has some problems in current health management, for example, community health servicecenters lack sufficient capacity in terms of personnel allocation and service content to carry out healthBased on these problems in this study, we put forward a total of eight related policy recommendations

Keywords: health management     health risk appraisal     life span     basic public health service     clinical preventiveservice     community health service     health insurance    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-keyencryption scheme is proposed, whose security is proved based on the hardness of the classic decisional

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Development of the Public Safety System and a Security-Guaranteed Society

Liu Yi,Ni Shunjiang and Weng Wenguo

Strategic Study of CAE 2017, Volume 19, Issue 1,   Pages 118-123 doi: 10.15302/J-SSCAE-2017.01.017

Abstract:

Public safety, as an essential element of a nation's development,study of China's medium- and long-term development strategy for engineering science and technology, publicorder to build a well-off society that is powerful in science and technology, it is urgent to improve publicsafety at all levels and to carry out research on a public-safety science and technology developmentThis paper introduces the public-safety science and technology development strategy along with its path

Keywords: public safety system     strategic research     safety and resilience     technology innovation    

Preserving privacy information flowsecurity in composite service evolution None

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 626-638 doi: 10.1631/FITEE.1700359

Abstract: After a composite service is deployed, user privacy requirements and trust levels of component servicesWhen the changes occur, it is critical to preserve privacy information flow security.We propose an approach to preserve privacy information flow security in composite service evolution.item dependency graph, and the security scope of each component service is calculated.Finally, the evolution operations that preserve privacy information flow security are defined.

Keywords: Composite service     Privacy information flow security     Service evolution     Petri net    

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Strategic Study of CAE 2009, Volume 11, Issue 8,   Pages 72-78

Abstract:

As web service is taken up to develop distributed simulation system increasingly

Keywords: Web service security     double access control     distributed simulation system    

Title Author Date Type Operation

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Journal Article

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Journal Article

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Journal Article

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Journal Article

Modernization of Public Service Governance in Rural Areas of China

Ma Chen,Li Jin,Zhao Chunjiang,Zhang Qian,Sun Ning,Song Taichun,Feng Xian,Cao Bingxue

Journal Article

Analysis of Scientific and Technological Issues and Resear chof Development Strategy Plan on China’s PublicSecurity

He Ping,Mi Jia,Yin Weiwei

Journal Article

Servitization Development Strategy on Manufacturing

The Research Group for Servitization Development Strategy on Manufacturing

Journal Article

Construction and Issues Related to the First Phase Project of Dust-storm Monitoring, Predicting and Service

Wang Xuechen,Cheng Lei

Journal Article

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Journal Article

The Current Situation and Development of Health Management in China

Li Jiang,Tao Sha,Li Ming,Fu Hua,Wang Ke’an,Tian Chuansheng and Wang Longde

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Development of the Public Safety System and a Security-Guaranteed Society

Liu Yi,Ni Shunjiang and Weng Wenguo

Journal Article

Preserving privacy information flowsecurity in composite service evolution

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Journal Article

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Journal Article