Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in cu...Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in current legal system for water environmental protection in this area, and also discusses their possible causes and potential problems in the future based on first hand materials and other literature. According to the theories of integrated river basin management and environmental equity principle, legal proposals are put forward, which include building an unitary legal system dedicated to the Reservoir Area, setting up a basin authority of the Yangtze River to preside over the resources protection and development, using interests' compensation system to solve interest conflicts among different reaches, and making concrete regulations to direct public participation in water environmental security protection of the Three Gorges Reservoir Area.展开更多
L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environme...L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s...Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.展开更多
文摘Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in current legal system for water environmental protection in this area, and also discusses their possible causes and potential problems in the future based on first hand materials and other literature. According to the theories of integrated river basin management and environmental equity principle, legal proposals are put forward, which include building an unitary legal system dedicated to the Reservoir Area, setting up a basin authority of the Yangtze River to preside over the resources protection and development, using interests' compensation system to solve interest conflicts among different reaches, and making concrete regulations to direct public participation in water environmental security protection of the Three Gorges Reservoir Area.
基金Supported by National Science Foundation(10402033) Ministry of Education Key Lab.of West Mining and Hazard Control Key Research Founda-tion(04JS19) and Shaanxi Province Natural Science (2003E213)
文摘L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
基金Project supported by the National Natural Science Foundation of China (Nos. 60772098 and 60672068)the New Century Excel-lent Talents in University of China (No. NCET-06-0393)
文摘Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.