{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:58:12Z","timestamp":1726070292484},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030433086"},{"type":"electronic","value":"9783030433093"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43309-3_49","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T07:02:50Z","timestamp":1583823770000},"page":"353-360","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Refined Management of College Financial Budget Based on Cloud Computing Technology"],"prefix":"10.1007","author":[{"given":"Ruili","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiaopan","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,11]]},"reference":[{"issue":"6","key":"49_CR1","first-page":"107","volume":"21","author":"K Ding","year":"2015","unstructured":"Ding, K., Liu, W., Zeng, S., et al.: Study on standardization of financial management in tobacco farmer cooperatives: taking 41 demonstration cooperatives in Hunan province as examples. Acta Tabacaria Sinica 21(6), 107\u2013112 (2015)","journal-title":"Acta Tabacaria Sinica"},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.26458\/1742","volume":"17","author":"Y Holynskyy","year":"2017","unstructured":"Holynskyy, Y.: The importance of financial management principles in the state budget execution. Ann. Spiru Haret Univ. Econ. Ser. 17(4), 19 (2017)","journal-title":"Ann. Spiru Haret Univ. Econ. Ser."},{"key":"49_CR3","first-page":"190","volume":"56","author":"RH Burger","year":"2015","unstructured":"Burger, R.H., Kaufman, P.T., Atkinson, A.L.: Disturbingly weak: the current state of financial management education in library and information science curricula. J. Educ. Libr. Inf. Sci. 56, 190\u2013197 (2015)","journal-title":"J. Educ. Libr. Inf. Sci."},{"issue":"1","key":"49_CR4","doi-asserted-by":"publisher","first-page":"206","DOI":"10.17512\/pjms.2017.15.1.20","volume":"15","author":"M Siminic\u0103","year":"2017","unstructured":"Siminic\u0103, M., Motoi, A.G., Dumitru, A.: Financial management as component of tactical management. Polish J. Manag. Stud. 15(1), 206\u2013217 (2017)","journal-title":"Polish J. Manag. Stud."},{"issue":"1","key":"49_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10657-016-9534-3","volume":"43","author":"G Kontogeorga","year":"2017","unstructured":"Kontogeorga, G.: Does (better) regulation really matter? Examining public financial management legislation in Greece. Eur. J. Law Econ. 43(1), 153\u2013166 (2017)","journal-title":"Eur. J. Law Econ."},{"issue":"11","key":"49_CR6","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2017","unstructured":"Xia, Z., Wang, X., Zhang, L., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"49_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","volume":"6","author":"S Sarkar","year":"2018","unstructured":"Sarkar, S., Chatterjee, S., Misra, S.: Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans. Cloud Comput. 6(1), 46\u201359 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"4","key":"49_CR8","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TCC.2014.2350475","volume":"3","author":"RN Calheiros","year":"2017","unstructured":"Calheiros, R.N., Masoumi, E., Ranjan, R.: Workload prediction using ARIMA model and its impact on cloud applications\u2019 QoS. IEEE Trans. Cloud Comput. 3(4), 449\u2013458 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ins.2015.09.004","volume":"380","author":"M Sookhak","year":"2017","unstructured":"Sookhak, M., Gani, A., Khan, M.K., et al.: WITHDRAWN: dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101\u2013116 (2017)","journal-title":"Inf. Sci."},{"issue":"2","key":"49_CR10","first-page":"95","volume":"96","author":"AA Soofi","year":"2017","unstructured":"Soofi, A.A., Khan, M.I.: A review on data security in cloud computing. Int. J. Comput. Appl. 96(2), 95\u201396 (2017)","journal-title":"Int. J. Comput. Appl."},{"issue":"8","key":"49_CR11","doi-asserted-by":"publisher","first-page":"e4041","DOI":"10.1002\/cpe.4041","volume":"29","author":"MA Rodriguez","year":"2017","unstructured":"Rodriguez, M.A., Buyya, R.: A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments. Concurr. Comput. Pract. Exp. 29(8), e4041 (2017)","journal-title":"Concurr. Comput. Pract. Exp."}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43309-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T07:09:00Z","timestamp":1583824140000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43309-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030433086","9783030433093"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43309-3_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2020.com\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}