{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T16:20:19Z","timestamp":1773591619044,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,26]]},"DOI":"10.1145\/3695080.3695140","type":"proceedings-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T18:26:32Z","timestamp":1728757592000},"page":"342-349","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["General Implementation Path of Data Governance for the Oriented Digital Transformation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0328-0828","authenticated-orcid":false,"given":"Zhifang","family":"Yao","sequence":"first","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9074-1247","authenticated-orcid":false,"given":"Hongyan","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6640-5365","authenticated-orcid":false,"given":"Kaicheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3016-2581","authenticated-orcid":false,"given":"Dong","family":"Heng","sequence":"additional","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6161-2494","authenticated-orcid":false,"given":"Zhengqi","family":"Xiao","sequence":"additional","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5562-0228","authenticated-orcid":false,"given":"Xiao","family":"Jian","sequence":"additional","affiliation":[{"name":"Beijing Institute of Tracking and Telecommunications Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,12]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"221","article-title":"A high-performance metadata storage engine for Cloud Storage Systems [J]","volume":"45","author":"Hancong DUAN","year":"2016","unstructured":"DUAN Hancong, Xiang Xiaoke, LV Pengcheng. MUSE: A high-performance metadata storage engine for Cloud Storage Systems [J]. Journal of University of Electronic Science and Technology of China, 2016, 45 (2); 221-226.","journal-title":"Journal of University of Electronic Science and Technology of China"},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"95","article-title":"Metadata based catalog service technology for big data resources [J]","volume":"9","author":"Yongsheng WANG","year":"2018","unstructured":"WANG Yongsheng, Ma Liangli, Wang Liang. Metadata based catalog service technology for big data resources [J]. Command Information System and Technology, 2018, 9 (6); 95-100.","journal-title":"Command Information System and Technology"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"14","article-title":"Analysis of basic problems in data engineering[J]","volume":"26","author":"Ping Lin","year":"2012","unstructured":"Lin Ping, Liu Yonghui, Chen Dayong. Analysis of basic problems in data engineering[J]. Operations Research and Systems Engineering, 2012, 26 (1); 14-17.","journal-title":"Operations Research and Systems Engineering"},{"key":"e_1_3_2_1_4_1","volume-title":"Communication Technology","author":"Li Hongmin","year":"2009","unstructured":"Hongmin Li, Guangping Chen, Ronghui Ling, Min Lu. Sensitive. Internal and external network information exchange mode design and implementation [J]. Communication Technology, 2009 (04)."},{"key":"e_1_3_2_1_5_1","volume-title":"Computer and Network","author":"Sun Zhongwa","year":"2014","unstructured":"Zhongwa Sun. Application and research of honeypot technology in network security system [J]. Computer and Network, 2014 (17)."},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy Science and Technology","author":"Yin Rui","year":"2013","unstructured":"Rui Yin, Qi Hu, Bei Zhou. Discussion and Implementation of Internal and External Network Information Exchange Safety Solution [J]. Privacy Science and Technology, 2013 (02)."},{"issue":"02","key":"e_1_3_2_1_7_1","first-page":"120","volume":"34","author":"Chen Hongyan","year":"2015","unstructured":"Hongyan Chen, Junwei Wan, Qi Wang. Design and Implementation of High Performance Sorting Algorithms for Large Data [J]. Journal of Spacecraft TT&C Technology, 2015, 34(02): 120-127.","journal-title":"Journal of Spacecraft TT&C Technology"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2991\/msmee-17.2017.109"},{"key":"e_1_3_2_1_9_1","volume-title":"Research on Equipment Evaluation and Application plan decision based on data analysis [D]","author":"Xuan Li","year":"2016","unstructured":"Li Xuan. Research on Equipment Evaluation and Application plan decision based on data analysis [D]. Changsha: National University of Defense Technology, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"National University of Defense Technology. Research on X data Construction [M]","author":"Information Systems School","year":"2014","unstructured":"School of Information Systems and Management, National University of Defense Technology. Research on X data Construction [M]. Beijing: Science Press, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Digital Innovation: Strategies for Success in the Digital Age [M]","author":"A.","year":"2023","unstructured":"Brown, A. Digital Innovation: Strategies for Success in the Digital Age [M]. New York: McGraw-Hill, 2023."},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"56","article-title":"The Role of Digital Technologies in Enhancing Business Productivity","volume":"50","author":"K.","year":"2024","unstructured":"Davis, K. \"The Role of Digital Technologies in Enhancing Business Productivity\" [J]. Journal of Business Studies, 2024, 50(1), pp. 56-78.","journal-title":"Journal of Business Studies"}],"event":{"name":"ICCBD 2024: 2024 International Conference on Cloud Computing and Big Data","location":"Dali China","acronym":"ICCBD 2024"},"container-title":["Proceedings of the 2024 International Conference on Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695080.3695140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:32:47Z","timestamp":1773588767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":12,"alternative-id":["10.1145\/3695080.3695140","10.1145\/3695080"],"URL":"https:\/\/doi.org\/10.1145\/3695080.3695140","relation":{},"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"2024-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}