{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:56Z","timestamp":1750221356468,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,26]],"date-time":"2018-02-26T00:00:00Z","timestamp":1519603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Social Science Fund of China","award":["16BTQ075"],"award-info":[{"award-number":["16BTQ075"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,26]]},"DOI":"10.1145\/3193063.3193069","type":"proceedings-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T11:59:21Z","timestamp":1525089561000},"page":"59-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Overview of Techniques for Confirming Big Data Property Rights"],"prefix":"10.1145","author":[{"given":"Susu","family":"Cheng","sequence":"first","affiliation":[{"name":"Guangdong University of Finance and Economics"}]},{"given":"Haijun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Guangdong University of Finance and Economics"}]}],"member":"320","published-online":{"date-parts":[[2018,2,26]]},"reference":[{"volume-title":"Citation analysis of data files use {J}","author":"White H.","unstructured":"White, H. 1982. Citation analysis of data files use {J}.Library Trends. 31 (3), 467--477.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Stewart T, Kirstin T.","author":"Jim G.","year":"2009","unstructured":"Jim, G. One Science---A transformed scientific method{C}\/ \/ Tony H, Stewart T, Kirstin T. 2009.The Fourth Paradigm: Data-intensive Scientific Discovery. Redmond, WA: Microsoft Research. 19--33."},{"unstructured":"Altman M. and King G. 2007. A proposed standard for the scholarly citation of quantitative data {J\/OL}. D-Lib Magazine. 13 (3 \/4). {2017-02-08} http:\/\/www.dlib.org\/dlib\/march07\/altman\/03altman.html.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1087\/20090411"},{"volume-title":"Research on research data citation {J}","author":"Li Dandan","unstructured":"Li Dandan and Wu Zhenxin. 2013. Research on research data citation {J}.Library Journal. (5), 65--71.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"crossref","unstructured":"Altman M. 2008. A Fingerprint Method for Scientific Data Verification \/\/Advances in Computer and Information Sciences and Engineering. 311--316.","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-1-4020-8741-7_57"},{"volume-title":"Emergence and development of the data paper {J}","author":"Qu Baoqiang","unstructured":"Qu Baoqiang and Wang Kai. 2015. Emergence and development of the data paper {J}.Library & Information. (5), 1--8.","key":"e_1_3_2_1_7_1"},{"volume-title":"The Fourth Paradigm: Data-Intensive Scientific Discovery {M}\/\/ E-Science and Information Management","author":"Hey T.","unstructured":"Hey, T. 2012. The Fourth Paradigm: Data-Intensive Scientific Discovery {M}\/\/ E-Science and Information Management. Springer Berlin Heidelberg, 1.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Hu Lianglin and Shen Zhihong","author":"Wang Weihua","year":"2013","unstructured":"Wang Weihua, Hu Lianglin and Shen Zhihong. 2013. Development of scientific data reference specification {J}. China Science & Technology Resources Review. (1), 36--40."},{"key":"e_1_3_2_1_10_1","article-title":"Review on data citation in the context of big data {J}","author":"Hou Jinghuan","year":"2013","unstructured":"Hou Jinghuan, Fang Jingyi. 2013. Review on data citation in the context of big data {J}. Journal of Library Science in China. (1), 112--118.","journal-title":"Journal of Library Science in China. (1), 112--118."},{"unstructured":"Wang Cuiping Li Baiyang. 2015. Research on data--intensive sciences--oriented data citation analysis {J}. Information and Documentation Services. (3) 10--14.","key":"e_1_3_2_1_11_1"},{"unstructured":"Mayernik M. 2013. Bridging Data Lifecycles: Tracking Data Use via Data Citations Workshop Report{R\/OL}. http:\/\/nldr.library.ucar.edu\/repository\/assets\/technotes\/TECH-NOTE-000-000-000-860.","key":"e_1_3_2_1_12_1"},{"unstructured":"Dai Chaofan Wang Tao Zhang Pengcheng. 2010. Survey of data provenance technique {J}. Application research of computers. 27 (9) 3216--3221.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1084805.1084812"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1066157.1066296"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/11890850_16"},{"volume-title":"Data provenance's annotation schema and description model {J}","author":"Li Yazi","unstructured":"Li Yazi. 2007. Data provenance's annotation schema and description model {J}. New Technology of Library and Information Service. (7), 10--13.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","unstructured":"Bose R. 2002. A conceptual framework for composing and managing scientific data lineage{C}\/\/ International Conference on Scientific and Statistical Database Management. DBLP 15--19. 10.1109\/SSDM.2002.1029701","key":"e_1_3_2_1_18_1","DOI":"10.1109\/SSDM.2002.1029701"},{"volume-title":"Study on the method of provenance in science workflow for data publishing {J}","author":"Deng Zhonghua","unstructured":"Deng Zhonghua and Wei Yinzhen. 2014. Study on the method of provenance in science workflow for data publishing {J}. Library & Information. (3), 61--66.","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"publisher","unstructured":"Wang Y R. and Madnick S E. 1990. A polygon model for heterogeneous database systems: the source tagging perspective{C}\/\/ Proceedings of International Conference on Very Large Data Bases. Brisbane Queensland Australia DBLP 519--538.","key":"e_1_3_2_1_20_1","DOI":"10.5555\/645916.758355"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/646104.681202"},{"doi-asserted-by":"publisher","unstructured":"Buneman P Khanna S. and Tan W C. 2004. Why and Where: A Characterization of Data Provenance{C}\/\/ International Conference on Database Theory. Springer-Verlag. 316--330.","key":"e_1_3_2_1_22_1","DOI":"10.5555\/645504.656274"},{"doi-asserted-by":"publisher","unstructured":"Green T J Karvounarakis G and Tannen V. 2007. Provenance semi-rings {J}. Pods'07 Bejing. 72 (3) 289--292. 10.1145\/1265530.1265535","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1265530.1265535"},{"doi-asserted-by":"publisher","unstructured":"Ram S. and Liu J. 2009. A New Perspective on Semantics of Data Provenance{C}\/\/ International Workshop on the Role of Semantic Web in Provenance Management. DBLP.","key":"e_1_3_2_1_24_1","DOI":"10.5555\/2889875.2889882"},{"issue":"4","key":"e_1_3_2_1_25_1","first-page":"44","article-title":"Provenance in scientific workflow systems {J}","volume":"30","author":"Freire J.","year":"2007","unstructured":"Freire J. and Anand M K. 2007. Provenance in scientific workflow systems {J}. Bulletin of the Technical Committee on Data Engineering. 30 (4), 44--50.","journal-title":"Bulletin of the Technical Committee on Data Engineering."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1002\/cpe.v20:5"},{"unstructured":"Wei Yinzhen and Deng Zhonghua. 2015. A provenance framework for scientific workflow {J}. Information Studies: Theory & Application. (7) 115--118 114.","key":"e_1_3_2_1_27_1"},{"unstructured":"Hey T. Tansley S. and Tolle K. 2009. The fourth paradigm {M}. Microsoft Press. 17--18.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/s00778-002-0083-8"},{"unstructured":"Chen Ying. 2008. A Data Provenance Model Based on the Double - helical Structure of DNA. {J} New Technology of Library and Information Service. (10) 11--15.","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"crossref","unstructured":"Moreau L. and Groth P. 2013. PROV-Overview: An overview of the PROV family of documents {J}. PW3C Note. (4) 1--9.","key":"e_1_3_2_1_31_1","DOI":"10.1007\/978-3-031-79450-6_1"},{"key":"e_1_3_2_1_32_1","volume-title":"USA. CCSDS. Secretariat.","author":"Secretariat","year":"2002","unstructured":"CCSDS Secretariat, Program Integration Division (Code M-), National Aeronautics and Space Administration. Reference Model for an Open Archival Information System (OAIS){M}. Washington DC, USA. CCSDS. Secretariat. 2002."},{"volume-title":"Research on data traceability model and DC meta data mapping {J}","author":"Lin Fangfang","unstructured":"Lin Fangfang and Zhao Hui. 2016. Research on data traceability model and DC meta data mapping {J}. Digital Library Forum. (3), 10--16.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","article-title":"APROV based representation of data provenance for ETL process {J}","author":"Ke Jie","year":"2015","unstructured":"Ke Jie, Dong Hanbin, Liang Yiwen, Tan Chengyu and Ai Yong. 2015. APROV based representation of data provenance for ETL process {J}. Journal of SiChuan University, (5), 123--129.","journal-title":"Journal of SiChuan University, (5), 123--129."},{"volume-title":"Representing Interoperable Provenance Descriptions for ETL Workflows{M}. \/\/ The Semantic Web: ESWC 2012 Satellite Events","author":"Freitas A","unstructured":"Freitas A, Kampgen B, Oliveira J G, et al. 2012. Representing Interoperable Provenance Descriptions for ETL Workflows{M}. \/\/ The Semantic Web: ESWC 2012 Satellite Events. Berlin: Springer, 43--57.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/5.771065"},{"issue":"6","key":"e_1_3_2_1_37_1","first-page":"95","article-title":"Information Hiding Techniques for Steganography and Digital Watermarking {J}","volume":"28","author":"Katzenbeisser S.","year":"2000","unstructured":"Katzenbeisser S. and Petitcolas F A. 2000. Information Hiding Techniques for Steganography and Digital Watermarking {J}. Edpacs the Edp Audit Control & Security Newsletter. 28 (6), 95--172.","journal-title":"Edpacs the Edp Audit Control & Security Newsletter."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/4236.935180"},{"unstructured":"Fridrich J. Goljan M. and Du R. 2001. Invertible authentication {C}&par;Proceedings of SPIE Photonics West Security and Watermarking of Multimedia Contents III San Jose California USA. 197--208.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/TIP.2004.840686"},{"issue":"1","key":"e_1_3_2_1_41_1","first-page":"71","article-title":"Watermarking Relational Database {J}","volume":"3","author":"Agrawal R.","year":"2002","unstructured":"Agrawal R. and Kiernan J. 2002. Watermarking Relational Database {J}. Journal of Pla University of Science & Technology. 3 (1), 71--79.","journal-title":"Journal of Pla University of Science & Technology."},{"doi-asserted-by":"publisher","unstructured":"Fu Y Jin C. and Ma C. 2007. A Novel Relational Database Watermarking Algorithm{M}\/\/ Intelligence and Security Informatics. Springer Berlin Heidelberg.","key":"e_1_3_2_1_42_1","DOI":"10.5555\/1763599.1763622"},{"issue":"1","key":"e_1_3_2_1_43_1","first-page":"79","article-title":"Watermarking Relational Databases {J}","volume":"8349","author":"Sion A P","year":"2011","unstructured":"Sion A P. 2011. Watermarking Relational Databases {J}. Proceedings of SPIE - The International Society for Optical Engineering. 8349 (1), 79.","journal-title":"Proceedings of SPIE - The International Society for Optical Engineering."},{"key":"e_1_3_2_1_44_1","volume-title":"Zhao Dongning and Li Deyi","author":"Zhang Yong","year":"2003","unstructured":"Zhang Yong, Zhao Dongning and Li Deyi. 2003. Digital watermarking for relational databases {J} Computer Engineering and Applications. (25), 193--195."},{"unstructured":"Yu Zhiqiang. 2008. Watermarking techniques for multimedia authentication and copyright protection {D}.Xi'an: Northwestern Polytechnical University.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","volume-title":"Lue Guonian and Wu Pingsheng","author":"He Jianbang","year":"2010","unstructured":"He Jianbang, Lue Guonian and Wu Pingsheng. 2010. Study on property right protection of geographic information {M}. Beijing: Science Press. 337--418."},{"unstructured":"Jiang Bin. Research on text carrier information hiding and related technology.{D}. Zhengzhou: PLA information engineering university 2008.","key":"e_1_3_2_1_47_1"},{"issue":"2","key":"e_1_3_2_1_48_1","first-page":"327","article-title":"Electronic Discovery in Federal Civil Litigation: Is Rule 34 Up to the Task? {J}","volume":"41","author":"Scheindlin S A","year":"2000","unstructured":"Scheindlin S A. and Rabkin J. 2000. Electronic Discovery in Federal Civil Litigation: Is Rule 34 Up to the Task? {J}. Boston College Law Review. 41 (2), 327--382.","journal-title":"Boston College Law Review."},{"unstructured":"Kruse Ii W G. and Heiser J G. 2001. Computer forensics: incident response essentials {M}. Addison Wesley Pub Co Inc.","key":"e_1_3_2_1_49_1"},{"unstructured":"Zhang Chao. 2010. Under cloud calculative environment electronic data investigation and evidence collection {J}. Netinfo Security. (11) 52--54.","key":"e_1_3_2_1_50_1"},{"unstructured":"Wu Shaobing. 2012. Research of key technologies of electronic evidence forensics based on cloud computing environment. {J}. Computer Science. (11) 139--142.","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","volume-title":"Huang Daoli and Guo Hong","author":"Jin Bo","year":"2016","unstructured":"Jin Bo, Yang Tao, Wu Songyang, Huang Daoli and Guo Hong. 2016. Review of digital forensics {J}.Chinese Journal of Forensic Sciences. (1), 62--74."},{"unstructured":"Guo Hong and Xu ZhiQiang. 2016. Status and trends of electronic data forensics equipment and software {J}.Secrecy Science and Technology. (3) 28--34.","key":"e_1_3_2_1_53_1"},{"volume-title":"The method of tracing data based on trusted digital forensics {D}","author":"Shao Zehui","unstructured":"Shao Zehui. 2014. The method of tracing data based on trusted digital forensics {D}. Nanjing: Nanjing University of Posts and Telecommunications,","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. {EB\/OL}. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Satoshi Nakamoto","year":"2017","unstructured":"Satoshi Nakamoto. 2017. Bitcoin: A Peer-to-Peer Electronic Cash System. {EB\/OL}. https:\/\/bitcoin.org\/bitcoin.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.5555\/3006358"},{"key":"e_1_3_2_1_57_1","volume-title":"Blockchain: The state of the art and future trends {J}. Acta Automatica Sinica, (4), 481--494.","author":"Yuan Yong","year":"2016","unstructured":"Yuan Yong and Wang Feiyue. 2016. Blockchain: The state of the art and future trends {J}. Acta Automatica Sinica, (4), 481--494."},{"key":"e_1_3_2_1_58_1","volume-title":"Pei Qingqi and Liu Xuefeng","author":"Shen Xin","year":"2016","unstructured":"Shen Xin, Pei Qingqi and Liu Xuefeng. 2016. Survey of block chain {J}. Chinese journal of network and information security. (11), 11--20."},{"key":"e_1_3_2_1_59_1","volume-title":"Zhan Likui and Wu Zhongcheng","author":"Zhao He","year":"2015","unstructured":"Zhao He, Li Xiaofeng, Zhan Likui and Wu Zhongcheng. 2015. Data integrity protection method for microorganism sampling robots based on blockchain technology {J}. Huangzhong University of Sci and Tech, (Z1), 216--219."},{"volume-title":"Block chain technology-based security of electronic health records {J}","author":"Huang Yonggang","unstructured":"Huang Yonggang. 2016. Block chain technology-based security of electronic health records {J}. Chinese Journal of Medical Library and Information Science. (10), 38--40.","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","volume-title":"Wei Jinwu and Liu Lu","author":"Liu Nan","year":"2016","unstructured":"Liu Nan, Wei Jinwu and Liu Lu. 2016. Big data exchange based on information chain {J}. Telecommunications Science. (10), 130--13."}],"event":{"acronym":"ICIIT 2018","name":"ICIIT 2018: 2018 International Conference on Intelligent Information Technology","location":"Ha Noi Viet Nam"},"container-title":["Proceedings of the 2018 International Conference on Intelligent Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193063.3193069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193063.3193069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:09Z","timestamp":1750213569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193063.3193069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,26]]},"references-count":61,"alternative-id":["10.1145\/3193063.3193069","10.1145\/3193063"],"URL":"https:\/\/doi.org\/10.1145\/3193063.3193069","relation":{},"subject":[],"published":{"date-parts":[[2018,2,26]]},"assertion":[{"value":"2018-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}