resource access
Recently Published Documents


TOTAL DOCUMENTS

293
(FIVE YEARS 59)

H-INDEX

26
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Qikun Zhang ◽  
Liang Zhu ◽  
Yimeng Wu ◽  
Jianyong Li ◽  
Yinghui Meng ◽  
...  

Abstract Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources and resources can only be accessed by authorized legal users.However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. To deal with these problems, this paper proposes a dynamic access control technology based on privacy protection. Compared with existing access control technologies, the main advantages of this paper are as follows: 1) encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; 2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol safe under the hardness assumption of the discrete logarithm problem (DLP) and the decision bilinear Diffie-Hellman (DBDH) problem. Compared with the cited references, it has the advantages of low computational complexity, short computational time, and low communication overhead.


2021 ◽  
pp. 251484862110620
Author(s):  
Janet C. Sturgeon

For centuries, people who call themselves Akha had formed village landscapes of rotating shifting cultivation fields amid regenerating trees together with enduring wooded sites, all under the purview of their ancestors. In Mengsong, an Akha settlement on the ridge separating China and Burma, farmers had managed complex, biodiverse and flexible landscapes for 250 years. In 1996–1997, my extended research there identified cultivation patterns that I called landscape plasticity, referring to farming practices that were highly mutable over space and time, often transgressing state-allocated property lines and the international border with Burma. From 1997 to 2011, a combination of exclusionary state forest policies, the racialization of upland minorities, and a state poverty alleviation project brought landscape plasticity and the ancestors to an end. Using concepts from sentient landscapes, resource access, environmentalism, racialization, and capitalist markets, this paper seeks to explain how landscape plasticity and the ancestors were erased. At the same time, I explore the puzzle of why Akha farmers saw these contingent outcomes as positive


2021 ◽  
Vol 12 (1) ◽  
pp. 172-194
Author(s):  
Alan D. Hemmings

The demilitarisation provisions of the 1959 Antarctic Treaty are limited and contingent. Critically, a functional gap is enabled within the key Article I, which both prohibits ‘measures of a military nature’ and sanctions the use of military personnel and equipment in pursuit of ‘peaceful purposes’. None of the key terms and concepts are defined. With increasing focus on and in the Antarctic Treaty Area on interstate competition around resource access and regime control, and in particular the rapidly increasing geopolitical struggle between ‘the West’ and China both globally and within the Antarctic, and the transformation of what military activity actually entails, the existing demilitarisation principles are now inadequate. The failure to update these in the 60 years since the Antarctic Treaty was adopted, the lack of confidence that the historic Antarctic Treaty model of regional governance can itself manage the struggle, and indications over recent years that some states are even increasing the level of military entanglement with their Antarctic programmes, suggest it is now timely to reassess and respond to the case for substantive demilitarisation in the Antarctic Treaty Area.


2021 ◽  
pp. 1-18
Author(s):  
Klaus E. Meyer ◽  
Shameen Prashantham ◽  
Shiqi Xu

ABSTRACT Entrepreneurs play a focal role in a society's economic recovery from major disruptions such as the COVID-19 pandemic. We argue that entrepreneurs’ ability to identify and act on entrepreneurial opportunities during the crisis reflects their resilience, and their innovations facilitate new patterns of work, learning, and leisure activities in post-COVID-19 societies. However, how, how quickly they act, and how influential their actions are depends on their context in terms of institutions, resource access, and market volatility. In China, some entrepreneurs have shown great resilience by utilizing network relationships and digital technology, not only to overcome short-term disruptions in 2020 but to shape the evolving ‘new normal’ where behaviors and capabilities have changed as a consequence of the experience of the pandemic. We discuss drivers of such resilient entrepreneurship during the COVID-19 pandemic in China and call for further research on the interplay between external disruptions, different types of entrepreneurship, and the consequences for resilience in emerging economies.


2021 ◽  
Vol 134 ◽  
pp. 102530
Author(s):  
Olivia del Giorgio ◽  
Mathis Loïc Messager ◽  
Yann le Polain de Waroux
Keyword(s):  

2021 ◽  
pp. 003804072110296
Author(s):  
Amanda Barrett Cox ◽  
Amy C. Steinbugler ◽  
Rand Quinn

Social capital is broadly beneficial, but parents reap particular benefits from network ties. Schools are key organizations through which parents develop ties. In this article, we examine school-based networks that provide valuable resources. What factors are associated with greater access to key resources such as child care, parenting advice, and educational information? Using network data from mothers of eighth graders, we employ qualitative comparative analysis to examine mothers’ status and network characteristics associated with two types of resource access— basic access, where resources are accessed through a single parent, and robust access, where resources are accessed through multiple parents. We find that particular combinations of status and network characteristics are critical. A wide range of mothers attain basic access, but race and socioeconomic status constrain robust access. These findings raise important questions about relational patterns and resource access for parents within a racially and socioeconomically diverse school.


Sign in / Sign up

Export Citation Format

Share Document