We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of...We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of Yang-Baxter equation.A unitary matrix R(x,φ1,φ2)is generated via the Yang-Baxterization approach.Then we construct a Yang-Baxter Hamiltonian through the unitary matrix R(x,φ1,φ2).Berry phase of this Yang-Baxter system is investigated in detail.展开更多
The approximate expressions of the travelling wave solutions for a class of nonlinear disturbed long-wave system are constructed using the generalized variational iteration method.
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ...There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.展开更多
基金Supported by National Natural Science Foundation of China under Grants No.10875026
文摘We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of Yang-Baxter equation.A unitary matrix R(x,φ1,φ2)is generated via the Yang-Baxterization approach.Then we construct a Yang-Baxter Hamiltonian through the unitary matrix R(x,φ1,φ2).Berry phase of this Yang-Baxter system is investigated in detail.
基金*Supported by the National Natural Science Foundation of China under Grant No. 40876010, the Main Direction Program of the Knowledge Innovation Project of Chinese Academy of Sciences under Grant No. KZCX2-YW-Q03-08, the R &: D Special Fund for Public Welfare Industry (Meteorology) under Grant No. GYHY200806010, the LASG State Key Laboratory Special Fund and the Foundation of E-Institutes of Shanghai Municipal Education Commission (E03004)
文摘The approximate expressions of the travelling wave solutions for a class of nonlinear disturbed long-wave system are constructed using the generalized variational iteration method.
文摘There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.