{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:46:29Z","timestamp":1774539989259,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030349851","type":"print"},{"value":"9783030349868","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34986-8_27","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:02:47Z","timestamp":1574848967000},"page":"373-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Preserving Government Data Sharing Based on Hyperledger Blockchain"],"prefix":"10.1007","author":[{"given":"Yurong","family":"Hao","sequence":"first","affiliation":[]},{"given":"Chunhui","family":"Piao","sequence":"additional","affiliation":[]},{"given":"Yongbin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xuehong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2753\/MIS0742-1222230403","volume":"23","author":"B Otjacques","year":"2007","unstructured":"Otjacques, B., Hitzelberger, P., Feltz, F.: Interoperability of E-government information systems: issues of identification and data sharing. J. Manag. Inf. Syst. 23(4), 29\u201351 (2007)","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.giq.2016.07.002","volume":"33","author":"EW Welch","year":"2016","unstructured":"Welch, E.W., Feeney, M.K., Park, C.H.: Determinants of data sharing in U.S. city governments. Gov. Inf. Q. 33(3), 393\u2013403 (2016)","journal-title":"Gov. Inf. Q."},{"key":"27_CR3","unstructured":"Ministry of Industry and Information Technology Information Center: 2018 White Paper on China\u2019s Block Chain Industry [J\/OL], 15 2018. \nhttp:\/\/www.miit.gov.cn\/n1146290\/n1146402\/n1146445"},{"key":"27_CR4","first-page":"1","volume":"21","author":"M Willard","year":"2019","unstructured":"Willard, M., Maharaj, M.S.: Privacy, security, trust, risk and optimism bias in e-government use: the case of two Southern African development community countries. S. Afr. J. Inf. Manag. 21, 1\u20139 (2019)","journal-title":"S. Afr. J. Inf. Manag."},{"issue":"19","key":"27_CR5","first-page":"6","volume":"60","author":"R Huang","year":"2016","unstructured":"Huang, R., Chen, C.: Cooperation model of US government data opening and sharing. Libr. Inf. Work. 60(19), 6\u201314 (2016)","journal-title":"Libr. Inf. Work."},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.dss.2004.10.013","volume":"42","author":"R Sarathy","year":"2004","unstructured":"Sarathy, R., Muralidhar, K.: Secure and useful data sharing. Decis. Support Syst. 42(1), 204\u2013220 (2004)","journal-title":"Decis. Support Syst."},{"issue":"07","key":"27_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(16)30053-7","volume":"2016","author":"S Clarke","year":"2016","unstructured":"Clarke, S.: Reducing the impact of cyberthreats with robust data governance. Comput. Fraud. Secur. 2016(07), 12\u201315 (2016)","journal-title":"Comput. Fraud. Secur."},{"key":"27_CR8","first-page":"146","volume":"5","author":"Y Liu","year":"2018","unstructured":"Liu, Y.: Research on government affairs openness in big data environment. Inf. Syst. Eng. 5, 146\u2013147 (2018)","journal-title":"Inf. Syst. Eng."},{"key":"27_CR9","first-page":"97","volume":"3","author":"L Sun","year":"2017","unstructured":"Sun, L., Li, G.J.: The research based on OGD application analysis model. Libr. Inf. Serv. 3, 97\u2013108 (2017)","journal-title":"Libr. Inf. Serv."},{"key":"27_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). Maxwell, J.C.: A Treatise on Electricity and Magnetism, 3rd edn, vol. 2, pp. 68\u201373. Clarendon, Oxford (1892)"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Tan, H., Zhou, T., Zhao, H., Zhao, Z., Wang, W., Zhang, Z., et al. File data protection and sharing method based on block chain [J\/OL]. J. Softw. 1\u201315 (2019). \nhttps:\/\/doi.org\/10.13328\/j.cnki.jos.005770","DOI":"10.13328\/j.cnki.jos.005770"},{"issue":"03","key":"27_CR12","first-page":"56","volume":"49","author":"X Chuan","year":"2019","unstructured":"Chuan, X., An, G., Liu, J.: Research on the construction of resource sharing service model of university libraries based on block chain theory. Libr. Res. 49(03), 56\u201362 (2019)","journal-title":"Libr. Res."},{"key":"27_CR13","unstructured":"Taylor, S.: Distributed ledger technology: beyond blockchain, 41. Government Office for Science, UK (2016)"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Qi Xia","year":"2017","unstructured":"Xia, Q., Sifa, E.B., Asamoah, K.O., et al.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain [J\/OL]. IEEE Access 5(99), 14757\u201314767 (2017)","journal-title":"IEEE Access"},{"key":"27_CR15","unstructured":"Jin, Y., Danny, X., Wang, G., Zeng, Z.: Research on e-government big data security sharing based on block chain. Inf. Secur. Res. 11 (2018)"},{"key":"27_CR16","first-page":"58","volume":"04","author":"Yu Yimin","year":"2019","unstructured":"Yimin, Yu., Chen, T., Duan, Z., et al.: Research on sharing model of government information resources based on block chain. E-Government 04, 58\u201367 (2019)","journal-title":"E-Government"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Ojo, A., Adebayo, S.: Blockchain as a next generation government information infrastructure: a review of initiatives in D5 countries. In: Ojo, A., Millard, J. (eds.) Government 3.0 \u2013 Next Generation Government Technology Infrastructure and Services, pp. 283\u2013298. Springer (2017)","DOI":"10.1007\/978-3-319-63743-3_11"},{"key":"27_CR18","unstructured":"Wang, M.L., Lu, J.Y.: Research on block chain technology and its application in government governance. e-Government 02, 2\u201314 (2018)"},{"key":"27_CR19","unstructured":"Zhang yi, Xiao congli, ning xiaojing. the influence of block chain technology on government governance innovation [J]. e-government. 2016(12)"},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2018.07.038","volume":"90","author":"Chunhui Piao","year":"2019","unstructured":"Piao, Ch.H., Shi, Y.J., Yan, J.Q., Zhang, Ch.Y., Liu, L.P.: Privacy-preserving governmental data publishing: a fog-computing-based differential privacy approach. Futur. Gener. Comput. Syst. 90, 158\u2013174 (2019)","journal-title":"Future Generation Computer Systems"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in E-Business Engineering for Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34986-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:12:08Z","timestamp":1574849528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34986-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9783030349851","9783030349868"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34986-8_27","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEBE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Business Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icebe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.computer.org\/icebe\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}