{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T21:12:34Z","timestamp":1722287554858},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T00:00:00Z","timestamp":1517875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Chongqing Research Academy of Education Sciences","award":["2017-GX-137"],"award-info":[{"award-number":["2017-GX-137"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11277-018-5442-x","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T09:19:23Z","timestamp":1517908763000},"page":"295-305","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Application and Synergy Mechanism of Cloud Computing in Government Audit"],"prefix":"10.1007","volume":"103","author":[{"given":"Xiao","family":"Hu","sequence":"first","affiliation":[]},{"given":"XiaoXiao","family":"Fu","sequence":"additional","affiliation":[]},{"given":"ZhengHua","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,6]]},"reference":[{"issue":"1","key":"5442_CR1","first-page":"160","volume":"33","author":"N Sultan","year":"2013","unstructured":"Sultan, N. (2013). Knowledge management in the age of cloud computing and web 2.0: Experiencing the power of disruptive innovations. IEEE Engineering Management Review, 33(1), 160\u2013165.","journal-title":"IEEE Engineering Management Review"},{"issue":"6","key":"5442_CR2","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2012.04.001","volume":"32","author":"L Angela","year":"2012","unstructured":"Angela, L., & Chen, N. C. (2012). Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal of Information Management, 32(6), 533\u2013540.","journal-title":"International Journal of Information Management"},{"key":"5442_CR3","first-page":"29","volume":"6","author":"JX Wei","year":"2014","unstructured":"Wei, J. X. (2014). Research on collaborative audit mode in cloud computing platform. Auditing Research, 6, 29\u201335.","journal-title":"Auditing Research"},{"key":"5442_CR4","first-page":"98","volume":"2","author":"F Wang","year":"2011","unstructured":"Wang, F. (2011). Cloud computing and cloud auditing\u2014Some thoughts on the concept and framework of audit in future. Chinese Certified Public Accountant, 2, 98\u2013103.","journal-title":"Chinese Certified Public Accountant"},{"key":"5442_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.procs.2016.06.024","volume":"89","author":"R Saxena","year":"2016","unstructured":"Saxena, R., & Dey, S. (2016). Cloud audit: A data integrity verification approach for cloud computing. Procedia Computer Science, 89, 142\u2013151.","journal-title":"Procedia Computer Science"},{"key":"5442_CR6","first-page":"23","volume":"6","author":"RS Qin","year":"2014","unstructured":"Qin, R. S. (2014). Research about influence of big data and cloud computing to audit. Auditing Research, 6, 23\u201328.","journal-title":"Auditing Research"},{"key":"5442_CR7","first-page":"12","volume":"6","author":"JY Wang","year":"2013","unstructured":"Wang, J. Y. (2013). Research on government audit management based on the synergy theory. Audit & Economy Research, 6, 12\u201319.","journal-title":"Audit & Economy Research"},{"issue":"2","key":"5442_CR8","first-page":"1","volume":"6","author":"F D\u00f6litzscher","year":"2013","unstructured":"D\u00f6litzscher, F. (2013). Sun behind clouds-on automatic cloud security audits and a cloud audit policy language. International Journal on Advances in Networks & Services, 6(2), 1\u201316.","journal-title":"International Journal on Advances in Networks & Services"},{"issue":"2","key":"5442_CR9","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.giq.2012.06.012","volume":"30","author":"DH Shin","year":"2013","unstructured":"Shin, D. H. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30(2), 194\u2013203.","journal-title":"Government Information Quarterly"},{"key":"5442_CR10","first-page":"37","volume":"3","author":"W Chen","year":"2012","unstructured":"Chen, W., & Wally, S. (2012). Study on online auditing methods in cloud computing environments. Auditing Research, 3, 37\u201344.","journal-title":"Auditing Research"},{"key":"5442_CR11","first-page":"1","volume":"7","author":"J Xiong","year":"2017","unstructured":"Xiong, J., Zhang, Y., Li, X., Lin, M., et al. (2017). Rse-pow: A role symmetric encryption pow scheme with authorized deduplication for multimedia data. Mobile Networks & Applications, 7, 1\u201314.","journal-title":"Mobile Networks & Applications"},{"issue":"99","key":"5442_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2017.2736645","volume":"1","author":"D Wu","year":"2017","unstructured":"Wu, D., Si, S., Wu, S., et al. (2017). Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet of Things Journal, 1(99), 1\u20131.","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"5442_CR13","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/19331680802425479","volume":"5","author":"TJ Paul","year":"2008","unstructured":"Paul, T. J., Jimmy, L., & Justin, M. G. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269\u2013283.","journal-title":"Journal of Information Technology & Politics"},{"key":"5442_CR14","first-page":"28","volume":"5","author":"ZJ Ma","year":"2015","unstructured":"Ma, Z. J., & Liang, S. Y. (2015). Study on full coverage audit implementation path of government environmental accountability audit in the era of big data. Auditing Research, 5, 28\u201334.","journal-title":"Auditing Research"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5442-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5442-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5442-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T00:08:50Z","timestamp":1549411730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5442-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,6]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["5442"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5442-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,6]]},"assertion":[{"value":"6 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}