首页 > 最新文献

Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...最新文献

英文 中文
Enabling Attribute-Based Access Control in Linux Kernel. 在Linux内核中启用基于属性的访问控制。
H O Sai Varshith, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri

Linux has built-in security features based on discretionary access control that can be enhanced using the Linux Security Module (LSM) framework. However, so far there has been no reported work on strengthening Linux with Attribute-Based Access Control (ABAC), which is gaining in popularity in recent years due to its flexibility and dynamic nature. In this paper, a method for enabling ABAC for Linux file system objects using LSM is proposed. We report initial experimental results and also share our public repository links for integrating ABAC in any Linux installation.

Linux具有内置的基于自由访问控制的安全特性,可以使用Linux安全模块(LSM)框架对其进行增强。然而,到目前为止,还没有关于使用基于属性的访问控制(ABAC)来增强Linux的报道,由于其灵活性和动态性,ABAC近年来越来越受欢迎。本文提出了一种利用LSM实现Linux文件系统对象ABAC的方法。我们报告了最初的实验结果,并分享了用于在任何Linux安装中集成ABAC的公共存储库链接。
{"title":"Enabling Attribute-Based Access Control in Linux Kernel.","authors":"H O Sai Varshith,&nbsp;Jaideep Vaidya,&nbsp;Shamik Sural,&nbsp;Vijayalakshmi Atluri","doi":"10.1145/3488932.3527293","DOIUrl":"https://doi.org/10.1145/3488932.3527293","url":null,"abstract":"<p><p>Linux has built-in security features based on discretionary access control that can be enhanced using the Linux Security Module (LSM) framework. However, so far there has been no reported work on strengthening Linux with Attribute-Based Access Control (ABAC), which is gaining in popularity in recent years due to its flexibility and dynamic nature. In this paper, a method for enabling ABAC for Linux file system objects using LSM is proposed. We report initial experimental results and also share our public repository links for integrating ABAC in any Linux installation.</p>","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9825047/pdf/nihms-1854493.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9535515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The functions of heraldic symbols in the English fiction 纹章符号在英国小说中的作用
I. Moiseiuk
The article considers the main functions performed by heraldic symbols due to their verbalization in blazons as descriptions of coats of arms by a specific set of language constructs. Heraldic symbols as the quintessence of culture are analyzed in the communicative-functional aspect. There are some special characteristics of heraldic symbolic units, namely, their multifunctional orientation, the possibility of multiple interpretations, the presence of a nomination mechanism, and others. The mediative and mnemonic functions of symbols, taken from the works of Lotman, are manifested in the heraldic symbols of fiction as one of the mechanisms of cultural memory, therefore, the symbol is a mediator of the semiosis spheres. The list of functions is supplemented by the consideration of the social dimension, because heraldic symbols are potentiated in the society, therefore, the essence of the identification-integrative and adaptive-regulatory functions of heraldic symbolism is revealed. The concepts of multimodal imagery and synesthesia effect, which are embodied in the interaction of verbal and nonverbal symbols, are involved in the analysis of the blazons on the material of English fiction. The theme of symbols functioning is supplemented by the classification of the main functions and subfunctions proposed by the author. The focus of the study is also the identification function, resulting in an emphasis on the role of a special heraldic language in the expression of the personality. Taking into account the types of coats of arms, the article considers the coding function in the punning and allusive coats of arms, as well as in the heraldic lexemes borrowed from other languages. The cross-cutting idea of the article is revealed through the interpretation of heraldic symbols in their functioning in the works of English fiction and poetry and summarized in the definition of the symbol not only as a linguistic unit, but also as a semiotic phenomenon of culture.
本文认为,由于纹章符号在纹章中的语言化,其主要功能是通过一套特定的语言结构来描述纹章。本文从交际功能的角度分析了纹章符号作为文化的精华。纹章符号单位有一些特殊的特点,即其多功能取向、多重解释的可能性、提名机制的存在等。从洛特曼的作品中提取的符号的中介和记忆功能,在小说的纹章符号中表现为文化记忆的机制之一,因此,符号是符号学领域的中介。由于纹章符号是在社会中被强化的,因此,在功能列表的补充中还考虑到了社会维度,从而揭示了纹章符号的识别-整合和适应-调节功能的本质。多模态意象和联觉效应的概念体现在语言符号和非语言符号的相互作用中,并被用于分析英语小说材料上的烙印。作者对符号的主要功能和次要功能进行了分类,补充了符号功能的主题。研究的重点也是识别功能,从而强调了一种特殊的纹章语言在表达个性方面的作用。本文从纹章的类型出发,探讨了双关语、暗示性纹章以及外来语纹章词汇的编码功能。本文通过阐释纹章符号在英语小说和诗歌作品中的作用来揭示其贯穿全文的思想,并将纹章符号定义为不仅是一种语言单位,而且是一种文化符号现象。
{"title":"The functions of heraldic symbols in the English fiction","authors":"I. Moiseiuk","doi":"10.26565/2218-2926-2021-22-03","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-03","url":null,"abstract":"The article considers the main functions performed by heraldic symbols due to their verbalization in blazons as descriptions of coats of arms by a specific set of language constructs. Heraldic symbols as the quintessence of culture are analyzed in the communicative-functional aspect. There are some special characteristics of heraldic symbolic units, namely, their multifunctional orientation, the possibility of multiple interpretations, the presence of a nomination mechanism, and others. The mediative and mnemonic functions of symbols, taken from the works of Lotman, are manifested in the heraldic symbols of fiction as one of the mechanisms of cultural memory, therefore, the symbol is a mediator of the semiosis spheres. The list of functions is supplemented by the consideration of the social dimension, because heraldic symbols are potentiated in the society, therefore, the essence of the identification-integrative and adaptive-regulatory functions of heraldic symbolism is revealed. The concepts of multimodal imagery and synesthesia effect, which are embodied in the interaction of verbal and nonverbal symbols, are involved in the analysis of the blazons on the material of English fiction. The theme of symbols functioning is supplemented by the classification of the main functions and subfunctions proposed by the author. The focus of the study is also the identification function, resulting in an emphasis on the role of a special heraldic language in the expression of the personality. Taking into account the types of coats of arms, the article considers the coding function in the punning and allusive coats of arms, as well as in the heraldic lexemes borrowed from other languages. The cross-cutting idea of the article is revealed through the interpretation of heraldic symbols in their functioning in the works of English fiction and poetry and summarized in the definition of the symbol not only as a linguistic unit, but also as a semiotic phenomenon of culture.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82051886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impoliteness in parliamentary discourse: a cognitive-pragmatic and sociocultural approach 议会话语中的不礼貌:一个认知-语用和社会文化的方法
I. Shevchenko, D. Alexandrova, Volodymyr Gutorov
This article focuses on the use of impoliteness strategies in the discourse of American, Bulgarian, Polish, and Ukrainian parliaments. Our research of impolite rhetoric, also known as unparliamentary language, is located on the intersection of cognitive pragmatics, cultural linguistics, and discourse analysis. We use an integrative framework, in which the pragmatics of impoliteness is underpinned by the cognitive model of the concept of impoliteness. We offer a description of impoliteness strategies in parliamentary discourse, single out the leading strategy of devaluation of the opponent, and define the stereotypical for each parliament verbal means of the strategy of devaluation and its tactics: criticism and belittlement of one’s merits and importance. Their verbal markers are lexicalized and syntactic units bearing the meaning of negative characterization, disrespect, mockery, sarcasm. We hypothesize that the variation of impoliteness strategies is different parliamentary discourses corresponds to linguistic, pragmatic, and sociocultural dissimilarities, and provide support for this through an empirical study. Linguistically, discursive means of devaluation in the American, Bulgarian, Polish, and Ukrainian parliaments are context free and context dependent, and their ratio varies. In all these parliamentary discourses, the lexicalized markers of impoliteness come from common mental source domains: negative evaluation, legal offence, democracy, deception, hostilities, their variation is due to corresponding construals of the world. Culturally, we claim that the form and content of impoliteness strategies is indirectly connected with a low-context culture in the USA as opposed to a high-context type of Slavic cultures. In the former, devaluation of opponents is mostly reached by lexicalized markers with inherent negative meaning; and in the latter, by syntactic context-dependent means. Pragmatically, the specific properties of impoliteness strategies in the four parliamentary discourses reveal their relation to the dominant politeness principles, which are negatively oriented in modern English and positively in Bulgarian, Polish, and Ukrainian.
本文主要研究美国、保加利亚、波兰和乌克兰议会话语中不礼貌策略的使用。我们对不礼貌修辞的研究,也被称为非议会语言,位于认知语用学,文化语言学和语篇分析的交叉点。我们使用了一个综合框架,在这个框架中,不礼貌的语用学是以不礼貌概念的认知模型为基础的。我们对议会话语中的不礼貌策略进行了描述,选出了贬低对手的主要策略,并定义了贬低策略的每种议会言语手段及其策略的刻板印象:批评和贬低自己的优点和重要性。他们的言语标记是词汇化和句法化的单位,承载着负面描述、不尊重、嘲弄、讽刺的含义。我们假设不礼貌策略的变化是不同的议会话语对应于语言、语用和社会文化的差异,并通过实证研究对此提供支持。从语言学上看,美国、保加利亚、波兰和乌克兰议会中的话语贬值手段与语境无关,且依赖于语境,其比例各不相同。在所有这些议会话语中,不礼貌的词汇化标记来自共同的精神来源领域:负面评价、法律犯罪、民主、欺骗、敌意,它们的变化是由于对世界的相应解释。在文化上,我们声称不礼貌策略的形式和内容与美国的低语境文化间接相关,而不是与高语境类型的斯拉夫文化。在前者中,对手的贬值主要是通过具有内在否定意义的词汇化标记来实现的;在后一种情况下,是通过句法上下文相关的方式。从语用学的角度看,四种议会语篇中不礼貌策略的具体特征揭示了它们与主流礼貌原则的关系,这些礼貌原则在现代英语中是负向的,而在保加利亚语、波兰语和乌克兰语中是积极的。
{"title":"Impoliteness in parliamentary discourse: a cognitive-pragmatic and sociocultural approach","authors":"I. Shevchenko, D. Alexandrova, Volodymyr Gutorov","doi":"10.26565/2218-2926-2021-22-05","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-05","url":null,"abstract":"This article focuses on the use of impoliteness strategies in the discourse of American, Bulgarian, Polish, and Ukrainian parliaments. Our research of impolite rhetoric, also known as unparliamentary language, is located on the intersection of cognitive pragmatics, cultural linguistics, and discourse analysis. We use an integrative framework, in which the pragmatics of impoliteness is underpinned by the cognitive model of the concept of impoliteness. We offer a description of impoliteness strategies in parliamentary discourse, single out the leading strategy of devaluation of the opponent, and define the stereotypical for each parliament verbal means of the strategy of devaluation and its tactics: criticism and belittlement of one’s merits and importance. Their verbal markers are lexicalized and syntactic units bearing the meaning of negative characterization, disrespect, mockery, sarcasm. We hypothesize that the variation of impoliteness strategies is different parliamentary discourses corresponds to linguistic, pragmatic, and sociocultural dissimilarities, and provide support for this through an empirical study. Linguistically, discursive means of devaluation in the American, Bulgarian, Polish, and Ukrainian parliaments are context free and context dependent, and their ratio varies. In all these parliamentary discourses, the lexicalized markers of impoliteness come from common mental source domains: negative evaluation, legal offence, democracy, deception, hostilities, their variation is due to corresponding construals of the world. Culturally, we claim that the form and content of impoliteness strategies is indirectly connected with a low-context culture in the USA as opposed to a high-context type of Slavic cultures. In the former, devaluation of opponents is mostly reached by lexicalized markers with inherent negative meaning; and in the latter, by syntactic context-dependent means. Pragmatically, the specific properties of impoliteness strategies in the four parliamentary discourses reveal their relation to the dominant politeness principles, which are negatively oriented in modern English and positively in Bulgarian, Polish, and Ukrainian.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77861660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verbal, visual, and verbal-visual puns in translation: cognitive multimodal analysis 翻译中的言语、视觉和言语-视觉双关语:认知多模态分析
Liudmila Kovalenko, A. Martynyuk
This paper presents results of cognitive multimodal analysis of English to Ukrainian and English to Russian translations of verbal, visual and verbal-visual puns found in the American animated tragicomedy sitcom “BoJack Horseman”. We have found that translation of verbal puns presupposes overcoming constraints caused by linguacultural specificity of the pun-producing source-text linguistic expressions (idioms and/or allusions). Translation of visual puns entails constructing an illuminating verbal context, which facilitates interpretation of the images. Translation of verbal-visual puns, both those in which the incongruous conceptual structures are cued verbally, and the image dubs the text, and those in which one of the incongruent structures is cued verbally and the other is triggered visually, demands reconciling the image with the text on top of coping with linguacultural specificity. We have revealed that to render the analyzed puns the translators resort to three basic translation procedures: retention, reduction, and replacement. Literal translation resulting in retention of a pun leads to foreignization of the target text unless the recipients can be expected to infer the pun due to the impact of cultural globalization. In all analyzed cases, translators failed to retain pun meanings cued by the image. Reduction and replacement result in complete (causing a loss of a pun) compulsory (imposed by linguacultural constraints) domestication. Reduction instantiates as choosing a target-language expression that cues only one of the two incongruent conceptual structures engaged in a pun and replacement presupposes using a target-language expression that compensates for the loss of a pun by creating a different humorous stimulus. In a multimodal/multimedial context, a target-text verbal expression can be replaced by a verbal-visual one.
本文对美国动画悲喜剧情景喜剧《马男波杰克》中英语到乌克兰语和英语到俄语的语言、视觉和语言-视觉双关语的翻译进行了认知多模态分析。我们发现,言语双关语的翻译以克服产生双关语的源语语言表达(习语和/或典故)的语言特殊性所造成的制约为前提。视觉双关语的翻译需要构建一个启发性的语言语境,这有利于对图像的解释。语言视觉双关语的翻译,无论是用语言暗示不协调的概念结构,用图像代替文本的双关语,还是用语言暗示一个不协调的概念结构,用视觉触发另一个不协调的概念结构的双关语,都需要在处理语言特殊性的基础上实现图像与文本的协调。我们发现,翻译人员在翻译双关语时要遵循三个基本的翻译步骤:保留、删减和替换。由于文化全球化的影响,除非译文的接受者能够推断出双关语,否则直译导致的双关语保留会导致译文的异化。在所有分析的案例中,译者都未能保留图像所暗示的双关语含义。减少和替代导致完全(造成双关语的丢失)强制性(由于语言的限制)归化。还原是指选择一种目的语表达,这种目的语表达只提示双关中两个不一致的概念结构中的一个,而替代是指使用一种目的语表达,通过创造不同的幽默刺激来补偿双关的损失。在多模态/多媒体语境中,目标文本的言语表达可以被言语视觉表达所取代。
{"title":"Verbal, visual, and verbal-visual puns in translation: cognitive multimodal analysis","authors":"Liudmila Kovalenko, A. Martynyuk","doi":"10.26565/2218-2926-2021-22-02","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-02","url":null,"abstract":"This paper presents results of cognitive multimodal analysis of English to Ukrainian and English to Russian translations of verbal, visual and verbal-visual puns found in the American animated tragicomedy sitcom “BoJack Horseman”. We have found that translation of verbal puns presupposes overcoming constraints caused by linguacultural specificity of the pun-producing source-text linguistic expressions (idioms and/or allusions). Translation of visual puns entails constructing an illuminating verbal context, which facilitates interpretation of the images. Translation of verbal-visual puns, both those in which the incongruous conceptual structures are cued verbally, and the image dubs the text, and those in which one of the incongruent structures is cued verbally and the other is triggered visually, demands reconciling the image with the text on top of coping with linguacultural specificity. We have revealed that to render the analyzed puns the translators resort to three basic translation procedures: retention, reduction, and replacement. Literal translation resulting in retention of a pun leads to foreignization of the target text unless the recipients can be expected to infer the pun due to the impact of cultural globalization. In all analyzed cases, translators failed to retain pun meanings cued by the image. Reduction and replacement result in complete (causing a loss of a pun) compulsory (imposed by linguacultural constraints) domestication. Reduction instantiates as choosing a target-language expression that cues only one of the two incongruent conceptual structures engaged in a pun and replacement presupposes using a target-language expression that compensates for the loss of a pun by creating a different humorous stimulus. In a multimodal/multimedial context, a target-text verbal expression can be replaced by a verbal-visual one.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76262406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Possible worlds of a literary text character: a cognitive and quantitative linguistic approach 文学文本人物的可能世界:认知与定量语言学方法
Dmytro Pavkin
The article aims to forward a model for analyzing the evaluative component of controversial literary characters. This model presupposes the application of the basic tenets of the possible worlds theory to the analysis of a fiction text, combining it with the methodology of cognitive and quantitative linguistics. To exemplify the employment of the developed model, the image of Louis XI, the King of France, depicted by W. Scott in his novel Quentin Durward, was analyzed. Portrayed as an astute politician, this protagonist puts on different guises and plays numerous roles while the plot unravels, trying to achieve his goals and influence the people around him. Such roles are viewed in the article as possible worlds of Louis XI. In these worlds, he is described through various positive and negative characteristics, which are considered predicates of basic propositional schemas featuring in semantics of lingual networks. To fathom the importance and ubiquity of the characteristics, two indices used in quantitative linguistics (coverage rate and mean frequency) were employed. Such a complex approach enabled to reveal the existence of 15 possible worlds of Louis XI in the novel. Two-thirds of them are primary possible worlds created via direct description of the image by the author, and one-third is secondary possible worlds, where the King is depicted indirectly by presenting the vantage point of other characters who appraise Louis and express their attitude to him. The most important characteristics of Louis emphasized by the author and featuring in the maximum number of his possible world create a portrait of a skillful medieval monarch. Being sly, he hypocritically conceals his true cruel and mercenary aspirations and generally succeeds in presenting himself to others as a devout Christian and wise ruler acting for the benefit of his subjects, which is vindicated by the prevalence of his positively charged descriptions. Thus, the image created by W. Scott in his novel lives up to the reputation of Universal Spider—the symptomatic nickname that this historical figure earned from his contemporaries.
本文旨在提出一个分析争议文学人物评价成分的模型。该模型的前提是将可能世界理论的基本原理应用于小说文本分析,并将其与认知语言学和定量语言学的方法相结合。本文以斯科特在小说《昆汀·德沃德》中所描绘的法国国王路易十一为例,分析了该模型的运用。作为一个精明的政治家,这个主人公在剧情展开的过程中,伪装成不同的角色,试图实现他的目标并影响他周围的人。这些角色在文章中被视为路易十一的可能世界。在这些世界中,他是通过各种积极和消极的特征来描述的,这些特征被认为是语言网络语义中基本命题图式的谓词。为了了解这些特征的重要性和普遍性,我们采用了定量语言学中常用的两个指标(覆盖率和平均频率)。这种复杂的方法使得小说中路易十一有15个可能的世界存在。其中三分之二是通过作者对形象的直接描述创造的主要可能世界,三分之一是次要可能世界,其中国王通过展示其他角色的优势来间接描绘,这些角色评价路易并表达他们对他的态度。作者强调路易最重要的特点,并在他可能的世界中尽可能多地表现出来,创造了一个熟练的中世纪君主的肖像。由于狡猾,他虚伪地隐藏了他真实的残酷和唯利是图的愿望,并且通常成功地将自己呈现给他人,作为一个虔诚的基督徒和明智的统治者,为他的臣民的利益而行动,这被他积极的描述所证实。因此,斯科特在小说中塑造的形象不愧为“宇宙蜘蛛”的名声——这是这位历史人物从同时代人那里获得的有症状的绰号。
{"title":"Possible worlds of a literary text character: a cognitive and quantitative linguistic approach","authors":"Dmytro Pavkin","doi":"10.26565/2218-2926-2021-22-04","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-04","url":null,"abstract":"The article aims to forward a model for analyzing the evaluative component of controversial literary characters. This model presupposes the application of the basic tenets of the possible worlds theory to the analysis of a fiction text, combining it with the methodology of cognitive and quantitative linguistics. To exemplify the employment of the developed model, the image of Louis XI, the King of France, depicted by W. Scott in his novel Quentin Durward, was analyzed. Portrayed as an astute politician, this protagonist puts on different guises and plays numerous roles while the plot unravels, trying to achieve his goals and influence the people around him. Such roles are viewed in the article as possible worlds of Louis XI. In these worlds, he is described through various positive and negative characteristics, which are considered predicates of basic propositional schemas featuring in semantics of lingual networks. To fathom the importance and ubiquity of the characteristics, two indices used in quantitative linguistics (coverage rate and mean frequency) were employed. Such a complex approach enabled to reveal the existence of 15 possible worlds of Louis XI in the novel. Two-thirds of them are primary possible worlds created via direct description of the image by the author, and one-third is secondary possible worlds, where the King is depicted indirectly by presenting the vantage point of other characters who appraise Louis and express their attitude to him. The most important characteristics of Louis emphasized by the author and featuring in the maximum number of his possible world create a portrait of a skillful medieval monarch. Being sly, he hypocritically conceals his true cruel and mercenary aspirations and generally succeeds in presenting himself to others as a devout Christian and wise ruler acting for the benefit of his subjects, which is vindicated by the prevalence of his positively charged descriptions. Thus, the image created by W. Scott in his novel lives up to the reputation of Universal Spider—the symptomatic nickname that this historical figure earned from his contemporaries.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82984261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storytelling in advertising and branding 在广告和品牌中讲故事
Alla Belova
Information communication technologies accelerated numerous trends in the world including the shift to online communication and further content digitalization. Technological innovations reverberate throughout complex social and demographic trends which make a significant impact on business, international companies including. The article focuses on linguistic analysis of the current changes in advertising and branding, mainly in the fashion industry. COVID-19 pandemic with online communication and remote work contributed to further transformation of choice, preferences, and options as well as to popularity of social media as an instrument of information search, as the environment for communication and sharing opinions. Lockdowns and quarantines during COVID-19 pandemic, lack of direct contact with clients entailed the shift to online marketing and advertising. Looking for effective online marketing instruments some companies select storytelling as a basis for their videos. Underpinned theoretically by multimodal discourse analysis and narrative studies, this paper shows how storytelling with its appeal to emotions and memorability potential is becoming a noticeable marketing trend and advertising strategy against the background of current radical technological changes in the information abundant world. Companies manufacturing lux products began to diversify marketing strategies and generate multimodal narrative – a string of stories about the brand, its founders, technologies they use. COVID-19 pandemic accelerated the shift to multimodal videos. During COVID-19 pandemic, fashion houses created marketing masterpieces to attract attention to new collections. They replaced traditional physical shows and set a new perspective for online fashion shows. These short films telling brand stories become chapters of a brand’s lookbook available in social media.
信息通信技术加速了世界上的许多趋势,包括转向在线通信和进一步的内容数字化。技术创新在复杂的社会和人口趋势中产生回响,对商业,包括国际公司产生重大影响。本文着重从语言学的角度分析当前广告和品牌的变化,主要是在时尚行业。COVID-19大流行与在线通信和远程工作共同促进了选择、偏好和选项的进一步转变,以及作为信息搜索工具和交流和分享意见环境的社交媒体的普及。在2019冠状病毒病大流行期间,由于封锁和隔离,缺乏与客户的直接接触,需要转向在线营销和广告。为了寻找有效的在线营销工具,一些公司选择讲故事作为他们视频的基础。本文以多模态语篇分析和叙事研究为理论基础,揭示了在当今信息丰富的世界中,在技术急剧变化的背景下,讲故事如何以其对情感和记忆潜力的吸引力成为一种引人注目的营销趋势和广告策略。制造lux产品的公司开始使营销策略多样化,并产生多模式叙事——一系列关于品牌、创始人和他们使用的技术的故事。COVID-19大流行加速了向多模式视频的转变。在2019冠状病毒病大流行期间,时装公司创造了营销杰作,以吸引人们对新系列的关注。它们取代了传统的实体秀,为网络时装秀开辟了新的视角。这些讲述品牌故事的短片成为社交媒体上品牌形象手册的章节。
{"title":"Storytelling in advertising and branding","authors":"Alla Belova","doi":"10.26565/2218-2926-2021-22-01","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-01","url":null,"abstract":"Information communication technologies accelerated numerous trends in the world including the shift to online communication and further content digitalization. Technological innovations reverberate throughout complex social and demographic trends which make a significant impact on business, international companies including. The article focuses on linguistic analysis of the current changes in advertising and branding, mainly in the fashion industry. COVID-19 pandemic with online communication and remote work contributed to further transformation of choice, preferences, and options as well as to popularity of social media as an instrument of information search, as the environment for communication and sharing opinions. Lockdowns and quarantines during COVID-19 pandemic, lack of direct contact with clients entailed the shift to online marketing and advertising. Looking for effective online marketing instruments some companies select storytelling as a basis for their videos. Underpinned theoretically by multimodal discourse analysis and narrative studies, this paper shows how storytelling with its appeal to emotions and memorability potential is becoming a noticeable marketing trend and advertising strategy against the background of current radical technological changes in the information abundant world. Companies manufacturing lux products began to diversify marketing strategies and generate multimodal narrative – a string of stories about the brand, its founders, technologies they use. COVID-19 pandemic accelerated the shift to multimodal videos. During COVID-19 pandemic, fashion houses created marketing masterpieces to attract attention to new collections. They replaced traditional physical shows and set a new perspective for online fashion shows. These short films telling brand stories become chapters of a brand’s lookbook available in social media.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84100741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020 第15届ACM亚洲计算机与通信安全会议,台北,台湾,2020年10月5日至9日
{"title":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020","authors":"","doi":"10.1145/3320269","DOIUrl":"https://doi.org/10.1145/3320269","url":null,"abstract":"","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74046958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outsourced private set intersection using homomorphic encryption 外包私有集交集使用同态加密
F. Kerschbaum
Private set intersection enables two parties -- a client and a server -- to compute the intersection of their respective sets without disclosing anything else. It is a fundamental operation -- equivalent to a secure, distributed database join -- and has many applications particularly in privacy-preserving law enforcement. In this paper we present a novel protocol that has linear complexity, is secure in the malicious model without random oracles, is client set size-independent and efficient. Furthermore, the computation of the intersection can be outsourced to an oblivious service provider, as in secure cloud computing. We leverage a completely novel construction for computing the intersection using Bloom filter and homomorphic encryption. For outsourcing we require and introduce a new homomorphic encryption scheme which may be of independent interest.
私有集合交集允许双方——客户端和服务器——计算各自集合的交集,而不泄露任何其他信息。它是一种基本操作,相当于安全的分布式数据库连接,在保护隐私的执法方面有许多应用。本文提出了一种新的协议,该协议具有线性复杂度,在没有随机预言的恶意模型中是安全的,与客户端集大小无关且高效。此外,交叉点的计算可以外包给无关服务提供商,就像在安全云计算中一样。我们利用一种全新的结构来计算交集,使用Bloom滤波器和同态加密。对于外包,我们需要并引入一种新的同态加密方案,这可能是独立的兴趣。
{"title":"Outsourced private set intersection using homomorphic encryption","authors":"F. Kerschbaum","doi":"10.1145/2414456.2414506","DOIUrl":"https://doi.org/10.1145/2414456.2414506","url":null,"abstract":"Private set intersection enables two parties -- a client and a server -- to compute the intersection of their respective sets without disclosing anything else. It is a fundamental operation -- equivalent to a secure, distributed database join -- and has many applications particularly in privacy-preserving law enforcement. In this paper we present a novel protocol that has linear complexity, is secure in the malicious model without random oracles, is client set size-independent and efficient. Furthermore, the computation of the intersection can be outsourced to an oblivious service provider, as in secure cloud computing. We leverage a completely novel construction for computing the intersection using Bloom filter and homomorphic encryption. For outsourcing we require and introduce a new homomorphic encryption scheme which may be of independent interest.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91503885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
Carving secure wi-fi zones with defensive jamming 用防御性干扰开辟安全wi-fi区域
Y. Kim, P. Tague, Heejo Lee, Hyogon Kim
With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wirelessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.
随着无线局域网等无线技术的广泛应用,信息泄露日益成为企业等重要用户面临的威胁。对解毒剂的研究主要集中在逻辑措施上,如身份验证协议和安全通道,但内部合作者可以很容易地绕过这些防御,并将机密信息无线转移到外部的发射器。在本文中,我们提出了一种新的方法来解决这个问题,即建立一个有围墙的无线覆盖,特别是一个安全的Wi-Fi区域。受到干扰作为一种攻击本质上是难以击败的事实的启发,我们把它作为一种防御武器来抵御来自外部的秘密非法访问。为了验证所提出的方法,我们使用IEEE 802.11g Wi-Fi适配器进行了广泛的户外实验。测试结果表明,伪造的安全区域与模型预测吻合良好,防御干扰方法确实可以用于保护无线网络免受信息泄漏。最后,我们提出了在任意几何形状下配置防御性干扰机的算法。
{"title":"Carving secure wi-fi zones with defensive jamming","authors":"Y. Kim, P. Tague, Heejo Lee, Hyogon Kim","doi":"10.1145/2414456.2414487","DOIUrl":"https://doi.org/10.1145/2414456.2414487","url":null,"abstract":"With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wirelessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81979694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An identity authentication protocol in online social networks 在线社交网络中的身份认证协议
Lingjun Li, Xinxin Zhao, G. Xue
Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.
近年来,在线社交网络(online social network, osn)的成功激发了对网络安全问题的研究。在osn系统中,一个最基本但也最具挑战性的安全问题是验证朋友的真实身份。解决此问题将受益于多个OSN的安全协议。现有的解决方案要求用户在身份验证之前安全地从他们的朋友那里获得一些秘密信息,这在osn中并不总是可行的。在本文中,我们提出了一种新的基于朋友之间共享的独家秘密的认证密钥交换协议。它以普通的方式提供身份验证和密钥交换,也就是说,用户不需要事先安全地交换或分发任何信息。该协议设计用于低熵输入信息,因为人类不擅长处理大量信息。我们协议的另一个优点是它对输入错误的容忍度考虑到人为错误总是存在的可能性。在通用可组合性(UC)框架下证明了该协议的安全性和有效性。
{"title":"An identity authentication protocol in online social networks","authors":"Lingjun Li, Xinxin Zhao, G. Xue","doi":"10.1145/2414456.2414471","DOIUrl":"https://doi.org/10.1145/2414456.2414471","url":null,"abstract":"Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82527014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1