An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h...An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.展开更多
A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committe...A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.展开更多
Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the impl...Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.展开更多
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three...The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站...[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。展开更多
基金This work was funded by the National Basic Research Program (973 Program) of China under Grant 2007CB310704.
文摘An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.
文摘A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.
文摘Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.
基金supported by the National HighTechnology Research and Development Programof China ("863" Program) under Grant No.2008AA01A204
文摘The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-
文摘[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。