To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel...To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.展开更多
From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relation...From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.展开更多
The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was...The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.展开更多
On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of Ch...On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.展开更多
On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-Presid...On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.展开更多
At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,vis...At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.展开更多
At the invitation of CAFIU,a 16-member delegation of American sinologists headed by Professor Thomas Gold of the Department of Sociology at the University of California,Berkeley,visited China from 21 July to 2 August.
At the invitation of CAFIU,a nine-member delegation,headed by Sen Nakata,Director of the NPO Corporation of Japan,composed by delegates from eight Japanese NGOs,including the Japan-China Friendship Association(JCFA)an...At the invitation of CAFIU,a nine-member delegation,headed by Sen Nakata,Director of the NPO Corporation of Japan,composed by delegates from eight Japanese NGOs,including the Japan-China Friendship Association(JCFA)and the Japan-China Workers'Exchange Association(JCWEA),visited China from 2 to 6 September.展开更多
In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances ...In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.展开更多
From June 9th to 18th,Vice-President Ai Ping led a delegation from of the Chinese Association for International Understanding(CAFIU)to visit Oman,Algeria,and Cyprus at the invitation of the Oman-China Friendship Assoc...From June 9th to 18th,Vice-President Ai Ping led a delegation from of the Chinese Association for International Understanding(CAFIU)to visit Oman,Algeria,and Cyprus at the invitation of the Oman-China Friendship Association,the Algeria-China Friendship Association and the Prometheus Institute of Cyprus.展开更多
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c...Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.展开更多
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform...Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.展开更多
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security...New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.展开更多
At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Spe...At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Speaker of the Hungarian National Assembly visited China on June 17-20,2015.In Beijing,Mr.Qi Xuchun,Vice-Chairman of展开更多
At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deput...At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deputy Secretary-General Liu Kaiyang accompanied the delegation to Chengdu.As a CAFIU staff member,I had the honor to accompany the展开更多
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro...To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.展开更多
On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu J...On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.展开更多
At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
基金funded by the Sichuan Science and Technology Program,Grant Nos.2024NSFSC0515,2024ZHCG0182 and MZGC20230013.
文摘To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.
文摘From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.
文摘The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.
文摘On March 21st,Mr.Ai Ping,Vice-President of CAFIU,met in Bejing with a 6-member delegation from the US Word4Asia led by Dr.Gene Wood,Chief Executive Officer of Word4Asia.Mme.Xiao Ningning,Deputy Secretary-General of China NGO Network for International Exchanges,Mr.Gu Chuanyong,Vice-Chair of Board of the Amity Foundation,and Mme.She Hongyu,Deputy Secretary-General of the Amity Foundation,attended the meeting.The two sides exchanged views on deepening people-to-people exchanges and cooperation between China and the United States and on the preparation of the 5th"Amity Cup"International Table Tennis Charity Competition.
文摘On March 13th,CAFIU Vice-President Liu Hongcai met the delegation from(JCP)Japan-China Friendship Association.The two sides exchanged views on people-to-people and youth exchanges between the two countries.Vice-President Liu Hongcai said that civil society organisations in China and Japan should persist in serving as bridges for official communication and contributing civil society efforts to promote China-Japan friendship.
文摘At the invitation of CAFIU,a delegation of 7 members of the Friedrich Ebert Foundation(FES),headed by Mr.Martin Schulz,Chairman of the Foundation,Former President of SPD,and Former President of European Parliament,visited China from 2nd to 7th February.During the delegation's visit in Beijing,Mr.Li Hongzhong,Member of the Political Bureau of the CPC Central Committee and Vice-Chairperson of the Standing Committee of the National People's Congress of China,met with the delegation.
文摘At the invitation of CAFIU,a 16-member delegation of American sinologists headed by Professor Thomas Gold of the Department of Sociology at the University of California,Berkeley,visited China from 21 July to 2 August.
文摘At the invitation of CAFIU,a nine-member delegation,headed by Sen Nakata,Director of the NPO Corporation of Japan,composed by delegates from eight Japanese NGOs,including the Japan-China Friendship Association(JCFA)and the Japan-China Workers'Exchange Association(JCWEA),visited China from 2 to 6 September.
文摘In Niger,a country at the southern end of the Sahara Desert,the announcement of the arrival of wushu teachers attracted a large number of people from near and far,despite a tiring journey.Curious and covetous glances testify to the attraction of this oriental culture.
文摘From June 9th to 18th,Vice-President Ai Ping led a delegation from of the Chinese Association for International Understanding(CAFIU)to visit Oman,Algeria,and Cyprus at the invitation of the Oman-China Friendship Association,the Algeria-China Friendship Association and the Prometheus Institute of Cyprus.
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
基金supported by the National Science Council under Grant No. NSC100-2410-H-005-046
文摘Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
文摘Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.
基金Project (No. 602032) supported by the Natural Science Foundationof Zhejiang Province, China
文摘New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.
文摘At the invitation of CAFIU,a 6-member delegation of Members of European Parliament(MEP)led by Mr.István Ujhelyi,Vice-Chair of the European Parliament Committee on Transport and Tourism(TRAN),and former Deputy Speaker of the Hungarian National Assembly visited China on June 17-20,2015.In Beijing,Mr.Qi Xuchun,Vice-Chairman of
文摘At the invitation of CAFIU,a 14-member neighboring NGO delegation composed of representatives from Bangladesh,India,Indonesia and the Philippines visited China’s Beijing and Chengdu from July 7 to 16,2015.CAFIU Deputy Secretary-General Liu Kaiyang accompanied the delegation to Chengdu.As a CAFIU staff member,I had the honor to accompany the
基金Supported by the National Basic Research Program of China(No.2012CB315905)the National Natural Science Foundation of China(No.61272501)the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China(No.J2013-31,Q2014-48)
文摘To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.
文摘On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.
文摘At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.