271,908 research outputs found

    The Holographic Models of the scalar sector of QCD

    Full text link
    We investigate the AdS/QCD duality for the two-point correlation functions of the lowest dimension scalar meson and scalar glueball operators, in the case of the Soft Wall holographic model of QCD. Masses and decay constants as well as gluon condensates are compared to their QCD estimates. In particular, the role of the boundary conditions for the bulk-to-boundary propagators is emphasized.Comment: Invited talk at the 5th International Conference on Quarks and Nuclear Physics QNP'09, Beijing, China, 21-26 September 2009. To be published in Chinese Physics

    Crouching Tigers and Hidden Dragons on the Great Wall Street: Decoding the Corporate Goverance of Chinese Commercial Banks

    Get PDF
    As China’s economic influence on the world grows, its system of state capitalism is likewise receiving increasing scrutiny. Behind the state capitalism, China’s banking sector, the “Great Wall Street”—parallel to the “Wall Street” in the United States—plays a fundamental role in financing and supporting China’s economy. Contemporary studies of China’s state capitalism, however, focus mainly on Chinese state-owned enterprises, leaving less attention specific to China’s state-owned banking sector which adopts a rather different corporate governance practice. In this paper, I conduct a comprehensive and critical review of the bank governance practice in China. Statutorily, Chinese commercial banks generally follow corporate governance best practices, including the requirement of independent directors and board sub-committees and the separation between chairpersons and CEOs. In reality, however, the Chinese party-state manages to dominate Chinese commercial banks by shifting the power center to the executive team, capturing power through its appointment and reward system, and separating the ownership from control. External governance mechanisms, such as market competition, bank regulation and supervision, and hostile takeovers, are inadequate to pose an effective constraint on the Chinese party-state. Under this practice, the Chinese party-state dominates Chinese commercial banks in a less visible manner and thus becomes the “Hidden Dragon” behind the Great Wall Street. In contrast, private capital, which is also a significant source of investment, only possesses marginal influence on the operational decision of Chinese commercial banks and thus becomes the “Crouching Tiger” on the Great Wall Street. Based on these observations, this article critically assesses this Crouching-Tiger-Hidden-Dragon model from an agency theory prospective. I identify three special agency problems underlying this model, including the misalignment between the public welfare vis-à-vis party-state’s interest, between the party-state’s interest vis-àvis bank executives’ interest, and between the bank executives’ interest vis-à-vis the banks’ interest. These special agency problems, in turn, account for the current challenges faced by China’s banking sector, including the rising risk exposure, the financial constraint of private sectors, and the lack of business innovation

    In Defense of a Double Standard in the Rules of Ethics: A Critical Reevaluation of the Chinese Wall and Vicarious Disqualification

    Get PDF
    This Note suggests that no change is warranted at the present time; courts should not adopt the Chinese wall defense to vicarious disqualification of private firms. The Chinese wall should, however, continue to operate as an internal device for protection of confidentiality. As such, it encourages firms to avoid disqualification by obtaining client consent to successive representation. Neither the historical record of the work of the Commission on the Evaluation of Professional Standards (the Kutak Commission), the empirical evidence currently available, nor the pragmatic arguments offered by many commentators justify an exception to, or modification of, the standard of imputed disqualification. Part I examines the historical development of the rule of vicarious disqualification, explaining the underlying rationale for the rule, the position of those who favor the rule as adopted in the Model Rules, and how the rule evolved with an exception for attorneys leaving government service. Part II discusses the status of the Chinese wall as a defense to vicarious disqualification, reviewing recent challenges to the present rule. Finally, Part III assesses the prospects for, and wisdom of, a change in the standard given the position that the courts have taken, the process of change within the ABA, and the practical problems of providing adequate guarantees against such conflicts of interest

    A New Distributed Chinese Wall Security Policy Model

    Get PDF
    The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed system) and has been attempted in the past; however the proposed solutions cannot deal with the composite information flows problem (e.g., a malicious Trojan horses problem), caused by the writing access rule imposed to the subject on the objects. In this article, we propose a new CWSP model, based on the access query type of the subject to the objects using the concepts of the CWSP. We have two types of walls placement, the first type consists of walls that are built around the subject, and the second around the object. We cannot find inside each once wall two competing objects\u27 data. We showed that this mechanism is a good alternative to deal with some previous models\u27 limitations. The model is easy to implement in a distributed system (as Cloud-Computing). It is based on the technique of Object Oriented Programming (Can be used in Cloud computing Software as a service SaaS ) or by using the capabilities as an access control in real distributed system

    Chinese Wall Security Policy

    Get PDF
    This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world. Though the policy was well accepted, but the model was incorrect. A decade later, Dr. Lin provided a model in 2003 that meets Brewer & Nash’s Policy. One of the important components in Cloud computing is data center. In order for any company to store data in the center, a trustable security policy model is a must; Chinese wall security policy model will provide this assurance. The heart of the Chinese Wall Security Policy Model is the concept of Conflict of Interest (COI). The concept can be modeled by an anti-reflexive, symmetric and transitive binary relation. In this project, by extending Dr. Lin’s Model, we explore the security issues in the environment of cloud computing and develop a small system of the Chinese Wall Security Model

    Information Flow Model for Commercial Security

    Get PDF
    Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security. A DAC system is information flow secure (IFS), if any data never flows into the hands of owner’s enemies (explicitly denial access list.
    • …
    corecore