期刊文献+
共找到1,547篇文章
< 1 2 78 >
每页显示 20 50 100
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
1
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
在线阅读 下载PDF
Improved Secure Trust-based Location-Aided Routing Model for MANETs 被引量:1
2
作者 王堃 吴蒙 《China Communications》 SCIE CSCD 2011年第3期154-162,共9页
In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed ... In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput. 展开更多
关键词 MANET(Ad Hoc) location-aided routing trust model trust-based routing network security
在线阅读 下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
3
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) Communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning model predictive control
在线阅读 下载PDF
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
4
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 DATABASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
在线阅读 下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
5
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
在线阅读 下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security Ⅱ:Implementation 被引量:5
6
作者 刘谦 王观海 +2 位作者 翁楚良 骆源 李明禄 《China Communications》 SCIE CSCD 2011年第2期86-94,共9页
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi... This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs. 展开更多
关键词 virt-BLP model MAC framework multi-level security XEN
在线阅读 下载PDF
A Secure Mutual Authentication Scheme of Blockchain-Based in WBANs 被引量:2
7
作者 Jianbo Xu Xiangwei Meng +2 位作者 Wei Liang Hongbo Zhou Kuan-Ching Li 《China Communications》 SCIE CSCD 2020年第9期34-49,共16页
Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data o... Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data of the human body or to act as an assistant regulator of several specific physiological indicators of the human body.The sensor devices transmit the harvested human physiological data to the local node via a public channel.Before transmitting data,the sensor device and the local node should perform mutual authentication and key agreement.It is proposed in this paper a secure mutual authentication scheme of blockchain-based in WBANs.To analyze the security of this scheme,formal security analysis,and informal security analysis are used,then the computation and communication costs are compared with those of the relevant schemes.Relevant experimental results reveal that the proposed scheme exhibit more effective control over energy consumption and promising. 展开更多
关键词 information security AUTHENTICATION blockchain WBANs Real-or-Random model
在线阅读 下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory 被引量:1
8
作者 LIU Qian WANG Guanhai WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con... At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 Virtual Machine System Mandatory Access Control multi-level security Virt-BLP
在线阅读 下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
9
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
在线阅读 下载PDF
Provably Secure Short Proxy Signature Scheme from Bilinear Maps
10
作者 胡国政 洪帆 《Journal of Southwest Jiaotong University(English Edition)》 2009年第3期199-206,共8页
An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two shor... An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature; the other is used for computing proxy signature. Finally, a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover, the proxy signature generation needs no pairing operation and verification needs just two pairing operation. 展开更多
关键词 security model Provable security Proxy signature Bilinear maps
在线阅读 下载PDF
Research on the Application Security Isolation Model
11
作者 Gong Lei Zhao Yong Liao Jianhua 《China Communications》 SCIE CSCD 2010年第6期153-156,共4页
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi... Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI. 展开更多
关键词 application isolation security model application security protection
在线阅读 下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
12
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service security Protocol Analysis Formal Theory Strand Space model Internet Key Exchange
在线阅读 下载PDF
Security Risk Analysis Model for Identification and Resolution System of Industrial Internet
13
作者 MA Baoluo CHEN Wenqu CHI Cheng 《ZTE Communications》 2020年第1期49-54,共6页
Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if th... Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if the identification and resolution system is attacked.Moreover,it may become a threat to national security.Therefore,security plays an important role in identification and resolution system of the industrial Internet.In this paper,an innovative security risk analysis model is proposed for the first time,which can help control risks from the root at the initial stage of industrial Internet construction,provide guidance for related enterprises in the early design stage of identification and resolution system of the industrial Internet,and promote the healthy and sustainable development of the industrial identification and resolution system. 展开更多
关键词 industrial Internet identification and resolution system security risk analysis model
在线阅读 下载PDF
Securing offshore resources development:A mathematical investigation into gas leakage in long-distance flexible pipes
14
作者 Xiang-An Lu Liang-Liang Jiang +1 位作者 Jian-Sheng Zhang Min-Gui Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第4期2734-2744,共11页
Gas flexible pipes are critical multi-layered equipment for offshore oil and gas development.Under high pressure conditions,small molecular components of natural gas dissolve into the polymer inner liner of the flexib... Gas flexible pipes are critical multi-layered equipment for offshore oil and gas development.Under high pressure conditions,small molecular components of natural gas dissolve into the polymer inner liner of the flexible pipes and further diffuse into the annular space,incurring annular pressure build-up and/or production of acidic environment,which poses serious challenges to the structure and integrity of the flexible pipes.Gas permeation in pipes is a complex phenomenon governed by various factors such as internal pressure and temperature,annular structure,external temperature.In a long-distance gas flexible pipe,moreover,gas permeation exhibits non-uniform features,and the gas permeated into the annular space flows along the metal gap.To assess the complex gas transport behavior in long-distance gas flexible pipes,a mathematical model is established in this paper considering the multiphase flow phenomena inside the flexible pipes,the diffusion of gas in the inner liner,and the gas seepage in the annular space under varying permeable properties of the annulus.In addition,the effect of a variable temperature is accounted.A numerical calculation method is accordingly constructed to solve the coupling mathematical equations.The annular permeability was shown to significantly influence the distribution of annular pressure.As permeability increases,the annular pressure tends to become more uniform,and the annular pressure at the wellhead rises more rapidly.After annular pressure relief followed by shut-in,the pressure increase follows a convex function.By simulating the pressure recovery pattern after pressure relief and comparing it with test results,we deduce that the annular permeability lies between 123 and 512 m D.The results help shed light upon assessing the annular pressure in long distance gas flexible pipes and thus ensure the security of gas transport in the emerging development of offshore resources. 展开更多
关键词 Offshore resources development Transport security Long-distance flexible pipes Gas leakage Heat and mass transfer model Finite difference calculation
在线阅读 下载PDF
我国建立人工智能安全监管制度的必要性及现实路径
15
作者 张其仔 李伟 《北京师范大学学报(社会科学版)》 北大核心 2025年第1期5-13,共9页
建立人工智能安全监管制度是应对人工智能安全风险的必然选择,是破除制度约束、释放经济增长新动能的先手棋,是推进国家治理体系和治理能力现代化的重要路径。建立人工智能安全监管制度要构建以治理取向、治理机制、治理架构、治理工具... 建立人工智能安全监管制度是应对人工智能安全风险的必然选择,是破除制度约束、释放经济增长新动能的先手棋,是推进国家治理体系和治理能力现代化的重要路径。建立人工智能安全监管制度要构建以治理取向、治理机制、治理架构、治理工具为核心的人工智能安全治理体系:治理取向方面,要以赋能人类社会发展为目标,实施“负责任”的监管;治理机制方面,要发挥行政治理的主导作用,充分利用市场治理和社群治理等多种治理模式;治理架构方面,要强化协同治理、构建人工智能监管合力;治理工具方面,要充分利用法律、政策、规范标准等强制性和指导性治理工具。未来,我国应明确监管范围、技术要求和底线原则,推动人工治理国际合作,构建“1+N”人工智能治理体系,加快推动人工智能安全监管制度建设。 展开更多
关键词 人工智能安全监管制度 治理模式 国家竞争
在线阅读 下载PDF
黄河流域碳排放脱钩与能源安全关系研究
16
作者 高建刚 徐凯 +1 位作者 刘津澔 何丽娜 《人民黄河》 北大核心 2025年第1期23-27,共5页
为了给全面推进黄河流域高质量发展和实现“双碳”目标等提供参考,以2005—2022年为研究期,构建能源安全指标体系,采用熵值法测度黄河流域各省份能源安全水平,采用Tapio模型测度黄河流域各省份碳排放脱钩状态,采用固定效应模型对碳排放... 为了给全面推进黄河流域高质量发展和实现“双碳”目标等提供参考,以2005—2022年为研究期,构建能源安全指标体系,采用熵值法测度黄河流域各省份能源安全水平,采用Tapio模型测度黄河流域各省份碳排放脱钩状态,采用固定效应模型对碳排放脱钩与能源安全的关系进行实证分析,结果表明:1)黄河流域各省份能源安全水平在研究期均呈上升趋势,但研究期末能源安全压力依然较大且省份间差别较大,能源安全形势整体上不容乐观;2)黄河流域各省份碳排放脱钩状态在研究期向好发展,多数省份曾呈现强脱钩状态,但脱钩状态不稳定即难以保持最佳状态;3)能源安全水平的提高对黄河流域碳排放脱钩具有促进效应,这种促进效应在2012年以后更加显著。提出了系统化提高黄河流域能源安全水平、加快“碳达峰”进程和加快转变经济发展方式等政策建议。 展开更多
关键词 能源安全 碳排放脱钩 Tapio模型 固定效应模型 实证分析 黄河流域
在线阅读 下载PDF
中国石油资源产业链供应链安全评价
17
作者 郑明贵 倪京生 +1 位作者 罗来文 董娟 《中国矿业》 北大核心 2025年第2期99-110,共12页
石油作为战略性矿产资源,在中国经济发展与社会稳定中发挥着关键作用,但中国石油对外依存度在2023年约为74%,远超50%的安全线。在这一背景下,如何构建中国石油资源产业链供应链安全评价指标体系成为当下亟待解决的问题。为此从资源获取... 石油作为战略性矿产资源,在中国经济发展与社会稳定中发挥着关键作用,但中国石油对外依存度在2023年约为74%,远超50%的安全线。在这一背景下,如何构建中国石油资源产业链供应链安全评价指标体系成为当下亟待解决的问题。为此从资源获取、资源流通与资源转化3个层面出发,构建评价指标体系。在对2000—2021年指标进行评级划分后,分别对指标进行均权与变权综合分析,得出研究期内安全水平变动情况,进一步结合障碍度与贡献度模型分析影响产业链供应链安全的因素。研究结果表明:(1)中国石油资源产业链供应链安全呈现出周期性变动,研究期内包含四个先上升后下降的小周期,同时整个研究期同样呈现出先上升后下降的趋势,说明中国石油资源产业链供应链安全虽然有波动但是围绕中心相对稳定,且波动呈现出周期性波动;(2)资源转化安全是阻碍中国石油资源产业链供应链安全的主要因素,这与中国在石油资源产业链供应链位置较低有关,且会影响资源的获取安全与流通安全;(3)石油资源产业链供应链安全的主要贡献因素相对复杂,第一周期内流通安全与转化安全为主要贡献因素,第二周期为转化安全,第三周期为流通安全,第四周期内三种因素的贡献度相对持平。针对上述结论,分别从资源获取、资源流通与资源转化三方面出发,为石油资源产业链供应链安全提供政策建议。本文研究为维护中国石油资源安全提出方向与思路,为增强产业链供应链安全提供参考支撑。 展开更多
关键词 石油 战略性矿产资源 产业链 供应链 安全评价 蒙特卡洛模拟 贡献度模型 障碍度模型
在线阅读 下载PDF
磁路控制型故障电流限制器研制
18
作者 吴维宁 侯凯 武迪 《新型电力系统》 2025年第1期59-73,共15页
随着我国电力系统规模的迅速发展及电网互联程度的不断提高,电网短路故障电流超标现象加剧,成本低、反应快、性能优、可靠性高的故障电流限制技术成为当前迫切需求之一。文章提出了磁路控制型故障电流限制器整体技术方案,研究了其基本... 随着我国电力系统规模的迅速发展及电网互联程度的不断提高,电网短路故障电流超标现象加剧,成本低、反应快、性能优、可靠性高的故障电流限制技术成为当前迫切需求之一。文章提出了磁路控制型故障电流限制器整体技术方案,研究了其基本原理、阻抗模型和特性模型,分析了电网不同接入位置对系统安全稳定性的影响,扫描计算了浙江电网典型方式下短路电流水平并提出故障限流器优化配置与综合防御技术,通过多物理场仿真与RTDS数模混合仿真验证了磁路控制型故障限流器技术的合理性与先进性,研制了10 kV磁路控制型故障限流器样机并在国网常州高压试验基地进行了短路试验,试验数据表明样机具备快速、可靠、优异的故障电流限制能力。 展开更多
关键词 磁路控制型 故障电流限制 阻抗模型 安全稳定 优化配置
在线阅读 下载PDF
气候韧性国土空间和城市的中国模式
19
作者 俞孔坚 《城市规划》 北大核心 2025年第1期4-15,共12页
本文是笔者持续30年关于国土空间和城市生态安全课题探索之延续。从基于自然的哲学、基于生态的国土空间格局、道法自然的生态工程技术和生态基础设施构建3个维度,定义了国土和城市气候韧性的中国模式。它根植于中国千百年积淀的季风文... 本文是笔者持续30年关于国土空间和城市生态安全课题探索之延续。从基于自然的哲学、基于生态的国土空间格局、道法自然的生态工程技术和生态基础设施构建3个维度,定义了国土和城市气候韧性的中国模式。它根植于中国千百年积淀的季风文化和传统生态智慧,经过科学化和模块化设计和在全国200多个城市的实践检验,通过对水过程的调控设计构建整体化的生态基础设施,保护与修复生境、调节洪涝、减缓干旱与热岛,柔性应对海潮、自然净化水土和提供避难空间等诸多方面,增强国土空间与城市的气候韧性。它展示了全球气候应对策略从以碳为中心的单一减排策略走向立足土地、水驱动的全面气候韧性策略的可行性。在全球气候日趋“季风化”以及灾害频发的今天,这一中国模式具有世界意义。 展开更多
关键词 气候韧性 生态文明 防洪 生态安全 水驱动气候韧性 基于自然的解决方案 海绵城市 中国模式
在线阅读 下载PDF
全面发展理论视域下公安院校思想政治教育创新发展研究
20
作者 张代伟 《成才之路》 2025年第9期37-40,共4页
文章探讨如何在马克思关于人的全面发展理论框架下,推进公安院校思想政治教育的创新与发展,并通过分析公安院校实践育人的内涵特征、公安院校实践育人与思想政治教育创新发展的内在逻辑,提出一系列创新发展的策略,如树立实践育人观念、... 文章探讨如何在马克思关于人的全面发展理论框架下,推进公安院校思想政治教育的创新与发展,并通过分析公安院校实践育人的内涵特征、公安院校实践育人与思想政治教育创新发展的内在逻辑,提出一系列创新发展的策略,如树立实践育人观念、建设实践育人队伍、构建实践育人机制、搭建实践育人平台,以期为公安高等教育现代化转型提供理论支持和实践指导。 展开更多
关键词 公安院校 全面发展 思想政治教育模式 实践育人 立德树人
在线阅读 下载PDF
上一页 1 2 78 下一页 到第
使用帮助 返回顶部