2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)最新文献

筛选
英文 中文
Edge Computing Enabled Resilient Wireless Network Virtualization for Internet of Things 支持边缘计算的物联网弹性无线网络虚拟化
D. Rawat, Md. Salik Parwez, Abdullah Alshammari
{"title":"Edge Computing Enabled Resilient Wireless Network Virtualization for Internet of Things","authors":"D. Rawat, Md. Salik Parwez, Abdullah Alshammari","doi":"10.1109/CIC.2017.00030","DOIUrl":"https://doi.org/10.1109/CIC.2017.00030","url":null,"abstract":"With the successful deployment of wireless networks such as cellular and Wi-Fi networks as well as development of lightweight hand-held devices, wireless communication became the fastest growing sector in communication industry and wireless networks have been part of every business. Over 25 billion devices are expected to be connected to the Internet by 2020. Because of exponentially increasing number of connected devices, we have Internet of Things (IoT) enabled applications that offer socioeconomic benefits. Different IoT applications have different operational requirements and constraints. For instance, IoT enabled transportation cyber-physical system needs lowest latency and high data rate, IoT enabled financial systems or banks need high security to support mobile banking, IoT enabled manufacturing systems need high resiliency to combat fault tolerance and cyber-attacks, IoT enabled cyber-physical power system needs the least latency and highest resiliency to avoid power outage caused by faults or cyber-attacks. In this paper, we propose wireless network virtualization to create different virtual wireless networks (VWNs) through mobile virtual network operators (MVNOs) to support different IoT enabled systems with diverse requirements and resiliency. Wireless virtualization is regarded as an emerging paradigm to enhance RF spectrum utilization, provide better coverage, increase network capacity, enhance energy efficiency and provide security. In order to prevent double-spending (allocating same frequency to multiple network providers) of wireless resources, we have proposed to use blockchain based approach which provides quality-of-service to users. Furthermore, IoT is expected to generate massive amount of data (aka big data), we consider edge computing to process big data when individual devices have limited computing/processing and storage capabilities. Moreover, network segmentation through VWNs provides the security and enhances the network performance. Performance of the proposed approach is evaluated using numerical results obtained from simulation.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127241563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Presenting a New Method, Using Topology Virtualization for Stabilizing Flow Tables in SDWN 提出了一种利用拓扑虚拟化稳定SDWN流表的新方法
Maryam Karimi, Mohammad Sadegh Najafi, R. Akbari, M. Keshtgari
{"title":"Presenting a New Method, Using Topology Virtualization for Stabilizing Flow Tables in SDWN","authors":"Maryam Karimi, Mohammad Sadegh Najafi, R. Akbari, M. Keshtgari","doi":"10.1109/CIC.2017.00037","DOIUrl":"https://doi.org/10.1109/CIC.2017.00037","url":null,"abstract":"Software Defined Networks split the data plane from the control plane. They can be used in wireless networks and will bring flexibility, less interference, simple management, less energy consumption and load balancing. They can also improve service quality, handover and mobility between different service providers. In previous methods, when link states were changed the controller deleted the stored topology and the tables in switches and updated them. Therefore, the controller should not only build the topology, but also execute the routing algorithms and install the routes in switch tables again. This may not cause any problems in wired networks, since link failure may not happen too often, but in wireless networks this happens frequently. In this paper the problems of (1) dynamic topology, (2) removing the whole flow table due to topology changes, and (3) time consuming routing algorithms are addressed. In the proposed method, after building a virtual topology with virtual node coordinates, the controller executes a heuristic routing algorithm on this topology. When the topology changes, the action of omitting rules from tables is applied only on routes including omitted or modified links and the rules related to missing routes should be deleted. Finally, the proposed method is compared with the L2_multi method (method used in POX controller). Results show that the proposed method decreases the average delay.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Recommendation-Based Approach for Cloud Service Brokerage: A Case Study in Public Administration 基于推荐的云服务经纪方法:以公共管理为例
A. Galletta, Oliver Ardo, A. Celesti, Peter Kissa, M. Villari
{"title":"A Recommendation-Based Approach for Cloud Service Brokerage: A Case Study in Public Administration","authors":"A. Galletta, Oliver Ardo, A. Celesti, Peter Kissa, M. Villari","doi":"10.1109/CIC.2017.00038","DOIUrl":"https://doi.org/10.1109/CIC.2017.00038","url":null,"abstract":"Cloud for Europe (C4E) is a project that aims at creating new Cloud workflows, named Service Flow (SF), for Public Administrations (PAs). These Services must guarantees on one hand to preserve national authorities, and on the other hand to promote efficiency, collaboration and harmonization for European PA bodies. This is possible by means of the creation of a Digital Market where PAs can select the Services (Service Flow Lots SFLs) that compose the entire SF. However the creation of such workflows is not trivial at all due the different legislations of European countries. In such a perspective, in this paper, we discuss a Recommendation-Based Cloud Service Brokerage system that helps European PA CSPs to choose SFL in order to create administration service workflows. In particular, we focus on a system prototype based on a NoSQL document database, i.e., MongoDB. Experiments comparing un-trusted, semi-trused and trusted scenarios prove the goodness of the recommendation-based Cloud service brokerage system prototype in terms of performance.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of a Blockchain-Based Lottery System for Smart Cities Applications 基于区块链的智慧城市彩票系统设计
Da-Yin Liao, Xuehong Wang
{"title":"Design of a Blockchain-Based Lottery System for Smart Cities Applications","authors":"Da-Yin Liao, Xuehong Wang","doi":"10.1109/CIC.2017.00044","DOIUrl":"https://doi.org/10.1109/CIC.2017.00044","url":null,"abstract":"Among the smart cities applications, optimizing lottery games is one of the urgent needs to ensure their fairness and transparency. The emerging blockchain technology shows a glimpse of solutions to fairness and transparency issues faced by lottery industries. This paper presents the design of a blockchain-based lottery system for smart cities applications. We adopt the smart contracts of blockchain technology and the cryptograph blockchain model, Hawk [8], to design the blockchain-based lottery system, FairLotto, for future smart cities applications. Fairness, transparency, and privacy of the proposed blockchain-based lottery system are discussed and ensured.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127556461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment 协同电子医疗环境中一种高效的基于多显示不可链接属性的证书方案
H. S. G. Pussewalage, V. Oleshchuk
{"title":"An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment","authors":"H. S. G. Pussewalage, V. Oleshchuk","doi":"10.1109/CIC.2017.00060","DOIUrl":"https://doi.org/10.1109/CIC.2017.00060","url":null,"abstract":"Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health systems is of paramount importance. As a way of achieving this requirement, more emphasis has been given to anonymous attribute credentials, which allows a user to anonymously prove the ownership of a set of attributes to a verifier and thereby gain access to protected resources. Among the existing well known credential schemes, the U-Prove does not provide unlinkability across multiple user sessions whereas Idemix provides it with a significant computational overhead. As a solution, we propose a novel, anonymous attribute based credential scheme with multi-session unlinkability. The simulation results and complexity analysis show that the proposed scheme achieves the aforementioned property with substantially lower computational overhead compared to the existing credential schemes with multi-session unlinkability. Finally, we present how the proposed credential scheme can be applied to a collaborative e-health environment to provide its users with the anonymous and unlinkable access.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"228 10‐11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture 多核仿真:一种研究回滚敏感内存结构的新方法
P. Chandran, Lakshya Garg, Aditya Kumar
{"title":"Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture","authors":"P. Chandran, Lakshya Garg, Aditya Kumar","doi":"10.1109/CIC.2017.00062","DOIUrl":"https://doi.org/10.1109/CIC.2017.00062","url":null,"abstract":"In today's cloud centred business environment, security of cloud solutions is a critical issue. Since virtualization is the foundational element of cloud computing and helps to achieve the benefits of cloud computing, security from virtualization becomes a major goal for the cloud based systems. Virtualization aims to create virtual versions of resources such as processors, memory, storage, network interfaces and devices for virtual machines (VMs), allowing the same set of resources to be shared among various VMs so that they can run together on the same hardware without knowing about each other's presence. Despite its indisputable benefits, data security vulnerabilities and performance degradation from the user's viewpoint, remain the main cause of concern, motivating fervent research involving hardware and software improvements for alleviating the two concerns. However, implementation and proper testing of these innovations is not easy with hardware, hybrid or API based software simulators, due to high implementation costs, absence of simulators capable of testing solutions that span multiple levels of hardware and software, and the different privilege levels of instructions. This is more relevant when the improvements proposed include instruction set modifications at different privilege levels. In this paper, we propose a different simulation approach - multikernel simulation approach. This is different from the conventional software-based simulation techniques in that we utilize the different privilege levels of the various kernels running on the server, and leverage them to distribute the components and logic that need to be simulated, into different levels of software, to simulate the effect of using it on the required privilege level. To accomplish this, we identify unused bits in the kernel software and use them to simulate hardware conditions. We implement and demonstrate this simulation technique for the Extended- HyperWall and RSDM architecture [1], [2], which is a hardware-based solution to improve the security of virtual machines in a fully virtualized environment, in the presence of an untrusted hypervisor (an entity that manages VMs), against rollback based attacks. Our simulation works in a fully virtualized environment and demonstrates the security of the proposed enhancement, without hardware prototypes, in a cost effective manner.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Personalizing Context-Aware Access Control on Mobile Platforms 在移动平台上个性化上下文感知访问控制
Prajit Kumar Das, A. Joshi, Timothy W. Finin
{"title":"Personalizing Context-Aware Access Control on Mobile Platforms","authors":"Prajit Kumar Das, A. Joshi, Timothy W. Finin","doi":"10.1109/CIC.2017.00025","DOIUrl":"https://doi.org/10.1109/CIC.2017.00025","url":null,"abstract":"Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as \"Violation Metric\" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate predefined policy is shown to have lesser user impact when trying to personalize access control policies for users.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Task Design and Crowd Sentiment in Biocollections Information Extraction 生物采集信息提取中的任务设计与群体情感
I. Alzuru, Andréa M. Matsunaga, Maurício O. Tsugawa, J. Fortes
{"title":"Task Design and Crowd Sentiment in Biocollections Information Extraction","authors":"I. Alzuru, Andréa M. Matsunaga, Maurício O. Tsugawa, J. Fortes","doi":"10.1109/CIC.2017.00056","DOIUrl":"https://doi.org/10.1109/CIC.2017.00056","url":null,"abstract":"Citizen science projects have successfully taken advantage of volunteers to unlock scientific information contained in images. Crowds extract scientific data by completing different types of activities: transcribing text, selecting values from pre-defined options, reading data aloud, or pointing and clicking at graphical elements. While designing crowdsourcing tasks, selecting the best form of input and task granularity is essential for keeping the volunteers engaged and maximizing the quality of the results. In the context of biocollections information extraction, this study compares three interface actions (transcribe, select, and crop) and tasks of different levels of granularity (single field vs. compound tasks). Using 30 crowdsourcing experiments and two different populations, these interface alternatives are evaluated in terms of speed, quality, perceived difficulty and enjoyability. The results show that Selection and Transcription tasks generate high quality output, but they are perceived as boring. Conversely, Cropping tasks, and arguably graphical tasks in general, are more enjoyable, but their output quality depend on additional machine-oriented processing. When the text to be extracted is longer than two or three words, Transcription is slower than Selection and Cropping. When using compound tasks, the overall time required for the crowdsourcing experiment is considerably shorter than using single field tasks, but they are perceived as more difficult. When using single field tasks, both the quality of the output and the amount of identified data are slightly higher compared to compound tasks, but they are perceived by the crowd as less entertaining.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration 组织间协作中基于属性的访问控制策略自适应
Saptarshi Das, S. Sural, Jaideep Vaidya, V. Atluri
{"title":"Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration","authors":"Saptarshi Das, S. Sural, Jaideep Vaidya, V. Atluri","doi":"10.1109/CIC.2017.00028","DOIUrl":"https://doi.org/10.1109/CIC.2017.00028","url":null,"abstract":"In Attribute-Based Access Control (ABAC), attributes are defined as characteristics of subjects, objects as well as environment, and access is granted or denied based on the values of these attributes. With increasing number of organizations showing interest in migrating to ABAC, it is imperative that algorithmic techniques be developed to facilitate the process. While the traditional ABAC policy mining approaches support the development of an ABAC policy from existing Discretionary Access Control (DAC) or Role-Based Access Control (RBAC) systems, they do not handle adaptation to the policy of a similar organization. As the policy itself need not be developed ab initio in this process, it provides agility and a faster migration path, especially for organizations participating in collaborative sharing of data. With the set of objects and their attributes given, along with an access control policy to be adapted to, the problem is to determine an optimal assignment of attributes to subjects so that a set of desired accesses can be granted. Here, optimality is in the number of ABAC rules the subjects would require to use to gain access to various objects. Such an approach not only helps in assisting collaboration between organizations, but also ensures efficient evaluation of rules during policy enforcement. We show that the optimal policy adaptation problem is NP-Complete and present a heuristic solution.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities 面向智慧城市的基于云的物联网平台实现有质量保证的数据传输
Sunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, R. Kowalczyk, S. Nepal
{"title":"Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities","authors":"Sunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, R. Kowalczyk, S. Nepal","doi":"10.1109/CIC.2017.00046","DOIUrl":"https://doi.org/10.1109/CIC.2017.00046","url":null,"abstract":"Adaptive cloud elasticity is a key requirement and an open challenge for the cost-effective and performance-efficient allocation of resources for cloud-based applications. It becomes even more challenging for IoT applications due to the dynamic and unpredictable characteristics of IoT data including volume, velocity, variety, volatility, and heterogeneity. In this paper, we study the impact of varying velocity and volume of IoT data streams on (a) the performance of the data ingestion and storage process, and (b) the corresponding cloud resource utilization. We use the open-source OpenIoT platform as our test bed and run experiments under different data streaming settings. We study the throughput and error rate, as well as CPU and memory consumption during the ingestion process. Experimental results reveal some interesting insights into the performance of OpenIoT and allow us to draw more general observations for cloud-based IoT platforms, including (a) resource availability is not the only factor influencing performance of the data ingestion process, with the middleware and software components having significant impact, (b) allocating extra resources at the infrastructure layer of the IoT platform can potentially improve the performance of the data ingestion process, but may lead to resource wastage, and (c) adaptive scaling out/in using small sized compute units can significantly improve resource utilization while ensuring quality-assured data delivery. Based on these insights, we identify two key future research directions for quality-assured data delivery in cloud-based IoT platforms including adaptive resource optimization at the infrastructure layer and component configuration optimization and/or upgradation at the middleware layer.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"3 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114030723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信