{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:03Z","timestamp":1750220643299,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1401100"],"award-info":[{"award-number":["2017YFB1401100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1145\/3424978.3425014","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:06:17Z","timestamp":1602788777000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["End-to-End Data Commodity Delivery Based on Metadata"],"prefix":"10.1145","author":[{"given":"Yaqing","family":"Si","sequence":"first","affiliation":[{"name":"School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yuqian","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"JUSFOUN Big Data Co., Ltd, Beijing, China"}]},{"given":"Jing","family":"Su","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0456-1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-017-0802-3"},{"key":"e_1_3_2_1_4_1","volume-title":"Application and development of blockchain technology in China's commodity trading market. Tsinghua financial review, 000(004), 48--51","author":"Tan Zhiyong","year":"2017","unstructured":"Tan Zhiyong and Zhao Wei ( 2017 ). Application and development of blockchain technology in China's commodity trading market. Tsinghua financial review, 000(004), 48--51 . Tan Zhiyong and Zhao Wei (2017). Application and development of blockchain technology in China's commodity trading market. Tsinghua financial review, 000(004), 48--51."},{"key":"e_1_3_2_1_5_1","first-page":"S15684946163029","article-title":"Uncertain Shapley value of coalitional game with application to supply chain alliance[J]","volume":"56","author":"Gao J","year":"2016","unstructured":"Gao J , Yang X and Di L ( 2016 ). Uncertain Shapley value of coalitional game with application to supply chain alliance[J] . Applied Soft Computing , 56 : S1568494616302988 . Gao J, Yang X and Di L (2016). Uncertain Shapley value of coalitional game with application to supply chain alliance[J]. Applied Soft Computing, 56: S1568494616302988.","journal-title":"Applied Soft Computing"},{"issue":"007","key":"e_1_3_2_1_6_1","first-page":"73","article-title":"Trading mode design and Counter Measure Research Based on block chain from the perspective of security of Internet consumer financial assets","volume":"000","author":"Jiang","year":"2018","unstructured":"Jiang kunliang and Song Jiashan ( 2018 ). Trading mode design and Counter Measure Research Based on block chain from the perspective of security of Internet consumer financial assets . Technical Economy and Management Studies , 000 ( 007 ), 73 -- 79 . Jiang kunliang and Song Jiashan (2018). Trading mode design and Counter Measure Research Based on block chain from the perspective of security of Internet consumer financial assets. Technical Economy and Management Studies, 000(007), 73--79.","journal-title":"Technical Economy and Management Studies"},{"key":"e_1_3_2_1_7_1","unstructured":"Liu Runda Wang Juan Le and Du Jia. (2008). Openid: an open digital identity management and authentication framework[J]. Computer applications and software 25(12) 127--129.  Liu Runda Wang Juan Le and Du Jia. (2008). Openid: an open digital identity management and authentication framework[J]. Computer applications and software 25(12) 127--129."},{"key":"e_1_3_2_1_8_1","volume-title":"Yuan song and Liu Rong","author":"Jin Ming","year":"2018","unstructured":"Jin Ming , Yuan song and Liu Rong ( 2018 ). Communication between client and server using JSON. Computer programming skills and maintenance, (4), 75--77. Jin Ming, Yuan song and Liu Rong (2018). Communication between client and server using JSON. Computer programming skills and maintenance, (4), 75--77."},{"key":"e_1_3_2_1_9_1","volume-title":"Sun Fan and Chen Xudong","author":"Wang Lei","year":"2015","unstructured":"Wang Lei , Sun Fan and Chen Xudong ( 2015 ). Application of restful, soap and ICAP in mobile network. Design technology of Posts and Telecommunications , (9), 35--38. Wang Lei, Sun Fan and Chen Xudong (2015). Application of restful, soap and ICAP in mobile network. Design technology of Posts and Telecommunications, (9), 35--38."}],"event":{"name":"CSAE 2020: The 4th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2020","location":"Sanya China"},"container-title":["Proceedings of the 4th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424978.3425014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:10Z","timestamp":1750197730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":8,"alternative-id":["10.1145\/3424978.3425014","10.1145\/3424978"],"URL":"https:\/\/doi.org\/10.1145\/3424978.3425014","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"2020-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}