没有合适的资源?快使用搜索试试~ 我知道了~
资源详情
资源评论
资源推荐
“复式转型”:地政府数据治改的逻辑分析
类型
期刊章
作者
张翔;
期
12
码
37-41
期刊
中国政管
ISSN
1006-0863
期
2018
引次数
11-1145/D
存档位置
CNKI
其它
00000
语
中;
摘要
地政府的数据治改内嵌于服务型政府建设的总情境中。当前,服务
型政府建设过程临着"增压"与"提质压"并存的"双重压"。由于"
双重压"的作,地政府的数据治改呈现出"复式转型"的逻辑特点,
即地政府是同时从"存数据治"与"增数据治"两个同维度推进
数据治改。在"复式转型"的过程中,地政府数据管平难以撑
数据治改的适应性困境逐渐显现出来。具体表现为三个基本盾:是
数据共享与数据安全之间的盾,是数据所有权与数据使权之间的盾,
三是数据公共性与部益性之间的盾。为解决这些盾,地政府的
数据治改需要抓住提"数据管平"为基础与建设"数据交平台"两
个改点,分层次地展开改。
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:26 AM
标签:
地政府
,
data management
,
数据管
,
local government
,
" Duplex Transition"
,
“复式转型”
,
big
data governance
,
governmental reform
,
数据治
,
政府改
笔记:
The following values have no corresponding Zotero field:
AD 福建师范学公共管学院;福建师范学政治发展与地治研究中;
标签:
_RW import
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
1 of 189 2019/4/11, 05:29
《数据安全与隐私保护 过程》国际标准提案研究
类型
期刊章
作者
克鹏;朱红儒;张东;
期
05
码
21-23+38
期刊
信息技术与标准化
ISSN
1671-539X
期
2018
引次数
11-4753/TN
存档位置
CNKI
语
中;
摘要
基于我国主研究制定的国家标准《数据安全能成熟度模型》,提出《
数据安全与隐私保护过程》国际标准提案,通过定义数据安全与隐私保护
的过程参考模型、过程评估模型和过程成熟度模型,帮助数据的参与组织
评估身的数据安全与隐私保护的能准,建数据安全与隐私保护
能的提升案;并介绍该国际标准项提案的编制背景、标准进展、技术
内容。
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:20:47 AM
标签:
数据安全
,
big data security
,
security standard
,
安全标准
,
maturity model
,
security and privacy
,
安全与隐私
,
成熟度模型
笔记:
The following values have no corresponding Zotero field:
AD 阿巴巴(中国)有限公司;
标签:
_RW import
A big data approach to the concordance of the toxicity of pharmaceuticals
in animals and humans
类型
期刊章
作者
Matthew Clark;;Thomas Steger-Hartmann
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
2 of 189 2019/4/11, 05:29
期刊
Regulatory Toxicology and Pharmacology
期
2018 vo 96
存档位置
CNKI
其它
00000
摘要
Abstract(#br)Although lack of efficacy is an important cause of late stage
attrition in drug development the shortcomings in the translation of toxicities
observed during the preclinical development to observations in clinical trials or
post-approval is an ongoing topic of research. The concordance between
preclinical and clinical safety observations has been analyzed only on relatively
small data sets, mostly over short time periods of drug approvals. We therefore
explored the feasibility of a big-data analysis on a set of 3,290 approved drugs
and formulations for which 1,637,449 adverse events were reported for both
humans animal species in regulatory submissions over a period of more than 70
years. The events reported in five species – rat, dog, mouse, rabbit, and
cynomolgus monkey - were treated as diagnostic tests for human events and the
diagnostic power was computed for each event/species pair using likelihood
ratios.(#br)The animal-human translation of many key observations is confirmed
as being predictive, such as QT prolongation and arrhythmias in dog. Our study
confirmed the general predictivity of animal safety observations for humans, but
also identified issues of such automated analyses which are on the one hand
related to data curation and controlled vocabularies, on the other hand to
methodological changes over the course of time.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:09 AM
标签:
Big data
,
Risk assessment
,
Adverse event
,
Concordance
,
Predictive value
,
Predictivity of animal
studies
,
Signal detection
,
Translation
笔记:
The following values have no corresponding Zotero field:
AD Elsevier R&D Solutions, 1600 JFK Blvd, Philadelphia, PA, 19103, USA;;Investigational
Toxicology, Bayer AG, 13353, Berlin, Germany
标签:
_RW import
A Big Data Privacy Protection Solution Based on Compressive Sensing
Theory
类型
期刊章
作者
DENG-LONG LV;;SHI-BING ZHU
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
3 of 189 2019/4/11, 05:29
期
2017
存档位置
CNKI
其它
00000
摘要
This paper analyzes the progress of privacy protection in big data environment,
and introduces the theory of compressive sensing, and then, proposes a new big
data privacy protection method based on compressed sensing and discusses the
realization of the method. According to the analysis, this new method has a
certain reference value in the realization of big data privacy preserving
technology.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:12 AM
A big–data security mechanism based on fully homomorphic encryption
using cubic spline curve public key cryptography
类型
期刊章
作者
Addepalli V. N. Krishna
期
6 vo 39
期刊
Journal of Information and Optimization Sciences
期
2018
存档位置
CNKI
其它
00000
摘要
Abstract(#br)In this work, a Cubic spline curve based Asymmetric mode
encrypting data is used for Fully Homomorphic encryption on Big–Data. A
steady state, one dimensional equation is integrated over a control volume to
generate global variables. These global variables are used to calculate public key
from chosen private key. Known the Public and private keys, the mechanism is
used in providing security on Big data. The mechanism can be extended to
Homorphic encryption where Arithmetic operations like addition and
multiplication can be done on cipher texts without disturbing their integrity. Thus
the proposed work supports the Security features even though the data is stored in
Public Domain like cloud.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:22 AM
标签:
Big Data Security
,
Crypto Analysis
,
Fully Homomorphic Encryption
,
Information theory
,
Numerical Analysis
,
Plain and Cipher texts
,
Public & Private Keys
笔记:
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
4 of 189 2019/4/11, 05:29
The following values have no corresponding Zotero field:
AD Department of Computer Science & Engineering, Faculty of Engineering , Christ University ,
Bengaluru 560074 , Karnataka , India
标签:
_RW import
A Distributed Authentication and Authorization Scheme for In-Network
Big Data Sharing
类型
期刊章
作者
Ruidong Li;;Hitoshi Asaeda;;Jie Li;;Xiaoming Fu
期刊
Digital Communications and Networks
期
2017
存档位置
CNKI
其它
00000
摘要
Abstract(#br)Big data strongly demands a network infrastructure having the
capability to efficiently support data sharing and retrieval. Information-Centric
Networking (ICN) approach is an emerging approach to satisfy this demand,
where big data is ubiquitously cached in the network and retrieved through
names. However, the existing authentication and authorization schemes mostly
rely on the centralized servers to provide certificate and mediation services for
data retrieval, which causes much traffic overhead for securely sharing data in a
distributed manner. To solve this problem, we employ the Identity-Based
Cryptography (IBC) to propose a distributed authentication and authorization
scheme (DAAS), where the Identity-Based Signature (IBS) is used to achieve
distributed verifications on the identities of Publishers and Users and the
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is used to enable the
distributed and fine-grained authorization. DAAS consists of three phases,
initialization, secure data publication, and secure data retrieval, which seamlessly
integrate authentication and authorization with the Interest/Data communication
paradigm in ICN. In particular, we propose trustworthy registration and Network
Operator and Authority Manifest (NOAM) dissemination to provide initial secure
registration and enable efficient authentication for global data retrieval.
Meanwhile, Attribute Manifest (AM) distribution coupling with automatic
attribute update is proposed to reduce the cost for attribute retrieval. We examine
the performance of the proposed DAAS, which shows that it can achieve lower
bandwidth cost compared to the existing schemes.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:05 AM
标签:
Big data
,
security
,
access control
,
authentication
,
in-network data sharing
,
information-centric
network
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
5 of 189 2019/4/11, 05:29
剩余188页未读,继续阅读
色空空色
- 粉丝: 981
- 资源: 330
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 车用驱动电机原理与控制基础-P140公式(6-57)~(6-58)
- MATLAB编程入门指南:环境搭建、基础语法及实用功能
- Oracle SQL Developer Data Modeler:数据建模与模型文档化及分享的最佳实践
- 使用 Python 为新年创建倒数计时器
- python语言huochepiao爬虫程序代码QZQ1.txt
- 2025 年新年快乐 -使用 HTML、CSS 和 JavaScript 设计新年贺卡
- Java毕设项目:基于spring+mybatis+maven+mysql实现的小区停车管理系统【含源码+数据库+毕业论文】
- Java毕设项目:基于spring+mybatis+maven+mysql实现的校园车辆管理系统【含源码+数据库+开题报告+毕业论文】
- 如何使用 Python 创建倒数计时器?
- Java毕设项目:基于spring+mybatis+maven+mysql实现的学生公寓管理系统【含源码+数据库+答辩PPT+毕业论文】
- 电子产品IM端子自动组装机sw14全套技术资料100%好用.zip
- Java毕设项目:基于spring+mybatis+maven+mysql实现的电动车租赁管理系统【含源码+数据库+毕业论文】
- 基于java的酒店客房管理系统的开题报告.docx
- 基于java的酒店预约及管理系统的开题报告.docx
- 电芯铝塑膜冲坑机sw14全套技术资料100%好用.zip
- 基于java的旅游攻略网站的开题报告.docx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0