http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Zhiyuan Tang(Zhiyuan Tang),Luyao Wang(Luyao Wang) 동아시아무역학회 2022 Journal of East Asian Trade(JEAT) Vol.4 No.1
Purpose – This paper discusses the legislative process and necessity of China’s Personal Information Protection Law, examines the main contents of China’s Personal Information Protection Law, and studies its impact on Chinese and Korean enterprises. Thus, China’s future data protection legal system can be better understood. Design/Methodology/Approach – In October 2020, China convened the 13th National People’s Congress to deliberate and promulgate the draft Personal Information Protection Law of the People’s Republic of China 2020. The draft privacy law is China’s first specialized legislation on personal information protection, drawing global attention. Furthermore, president Xi Jinping made clear his commitment to protecting personal information by reiterating the need for “cyber security and personal information security for people” and “protecting their legitimate rights and interests in cyberspace” after the 2019 National Cyber Week. The Personal Information Protection Act of China was enacted on November 1, 2021, as personal information protection was also a real concern among the Chinese people in the highly information-oriented era. Findings – China already has an independent and unified Personal Information Protection Act, which officially promulgates and enforces the Personal Information Protection Act this year following cybersecurity, cybersecurity, and criminal law provisions. Furthermore, in October 2020, China began a full-fledged legislative process by releasing a draft Personal Information Protection Act and collecting opinions. Research Implications – China’s Personal Information Protection Act is expected to play an important role for Chinese companies and Korean companies with subsidiaries in China due to offshore applications. Therefore, it is necessary to continue to pay attention to the revision and enforcement rules of the Personal Information Protection Act so that Chinese and Korean companies can respond quickly after it is promulgated and enforced. Therefore, this paper summarizes the background of China’s Personal Information Protection Act and the main contents of the 2021 edition of the Personal Information Protection Act.
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.6
With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.
Research on the Investment of Chinese and Korean Enterprises in the Middle East Arab Market
Zhiyuan Tang 동아시아무역학회 2023 Journal of East Asian Trade(JEAT) Vol.5 No.1
Purpose - The Middle East is experiencing constant international conflict. Still, with global investment attracting much attention, trade continues to increase, and the image of war-torn areas is changing gradually. Design/Methodology/Approach - Many countries in the Middle East are opening up their markets from oil and state monopolies, trying to attract investment and participate in the construction of diversified domestic industries. Findings - These countries are actively promoting that they are safe and reliable investors, regardless of regional conflicts, when political instability or tension in certain regions of the Middle East increases. In addition, Korean and Chinese companies are increasingly interested in the Middle East due to increased economic exchanges between Arab countries and China, increased investment in infrastructure by oil-producing countries, and increased imports and exports of Korean products. However, companies seeking access to Middle Eastern markets often face more complex problems than when they entered other regions. Research Implications - Investment in the Middle East market depends on the needs of related companies and governments in the Middle East, so it isn't easy to find a common point of contact. The number of Arab countries in the Middle East, including Kuwait, Saudi Arabia, Iran, Iraq, Egypt, Qatar, and Palestine, is estimated to be about 20. By analyzing the practicality and applicability of commercial and corporate laws in these countries, we will give some legal issues that Chinese and Korean companies should pay attention to when investing in the Middle East market.
( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7
Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.
Weak fault detection method of rolling bearing based on testing signal far away from fault source
Zhiyuan He,Guo Chen,Tengfei Hao,Chunyu Teng,Minli Hou,Zhenjie Chen 대한기계학회 2020 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.34 No.3
In some cases, because of the complex internal structure of the machines, the positions of the vibration sensors are far away from the rolling bearings, such as in an aeroengine, causing the fault features to become extremely weak, which brings great challenge to the detection of rolling bearings. To address this problem, an integrated detection method is proposed. First, a method named MEDL is proposed to determine the optimal filter length in minimum entropy deconvolution (MED) to enhance the periodic fault impulse component in the weak signal, which accuracy is 1. After that, the MEDL is combined with variational mode decomposition (VMD) and autocorrelation to extract fault features from strong background noise. A series of fault simulation experiments for rolling bearings were conducted by using an aeroengine rotor experimental rig with casing. The results verify that the accuracy of the integrated detection method is 100 % in different measuring points, speeds and fault types. At the same time, it compared with spectral kurtosis (SK) and empirical wavelet transform (EWT). It proves that the integrated detection method is more robust in extracting the weak fault characteristic of rolling bearings from the casing signals effectively.
Different QoS Constraint Virtual SDN Embedding under Multiple Controllers
( Zhiyuan Zhao ),( Xiangru Meng ),( Siyuan Lu ),( Yuze Su ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.9
Software-defined networking (SDN) has emerged as a promising technology for network programmability and experiments. In this work, we focus on virtual network embedding in multiple controllers SDN network. In SDN virtualization environment, virtual SDN networks (vSDNs) operate on the shared substrate network and managed by their each controller, the placement and load of controllers affect vSDN embedding process. We consider controller placement, vSDN embedding, controller adjustment as a joint problem, together considering different quality of service (QoS) requirement for users, formulate the problem into mathematical models to minimize the average time delay of control paths, the load imbalance degree of controllers and embedding cost. We propose a heuristic method which places controllers and partitions control domains according to substrate SDN network, embeds different QoS constraint vSDN requests by corresponding algorithms, and migrates switches between control domains to realize load balance of controllers. The simulation results show that the proposed method can satisfy different QoS requirement of tenants, keep load balance between controllers, and work well in the acceptance ratio and revenue to cost ratio for vSDN embedding.