Computer Science ›› 2025, Vol. 52 ›› Issue (3): 127-136.doi: 10.11896/jsjkx.240200003
• Database & Big Data & Data Science • Previous Articles Next Articles
ZHANG Lili1 , ZHANG Zheng2
CLC Number:
[1]LI Y X.National Data Resources Survey Report(2021) Released [J].Software and Integrated Circuits,2022(8):63-63. [2]BAO X L,DU W L.Institutional Construction of a Data TrustedTrading System:Based on the Perspective of on exchange Trading [J].E-government,2023(6):38-50. [3]QIAN W N,SHAO Q F,ZHU Y C,et al.Blockchain and Trusted Data Management:Problems and Methods [J].Journal of Software,2018,29(1):150-159. [4]LI Y.Research on trustworthy data collection of sensor clouds based on fog computing [D].Xiamen:Overseas Chinese University,2018. [5]WANG H Y,WANG R C,HUANG H P,et al.A trustworthy data collection method for wireless sensor networks based on ARMA model [J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2009,29(4):85-89,96. [6]HUANG Y X,LIANG Z H,HUANG B,et al.Supply ChainTrusted Data Management Based on Blockchain [J].Computer System Applications,2018,27(12):9-17. [7]KERROS.Norms of Computer Trespass[EB/OL].https://columbialawreview.org/wp-content/uploads/2016/05/Orin-S.-Kerr.pdf. [8]SONG Q Y.Research and Application of Personal Trusted Data Space [D].Guangzhou:Guangdong University of Technology,2019. [9]HUANG Y X,LIANG Z H,HUANG B,et al.Supply ChainTrusted Data Management Based on Blockchain [J].Computer System Applications,2018,27(12):9-17. [10]Congress Enacts the Clarifying Lawful Overseas Use of Data(CLOUD) Act.Reshaping US law governing crossborder accessto data[J].The American Journal of International Law,2018,112(3):487-493. [11]YANG D,LI Z S.On the Reconstruction of Anti Unfair Competition Law:With the Regulation System of Data Elements as the Core[J].Legal Application,2022(11):15-25. [12]HU L.The Formation of Property Rights in Data Elements:From Legal Structure to Market Structure [J].Oriental Law,2022(2):120-131. [13]YAN Y,MENG T G.Typology,Property Ownership and Governance Logic of Data Elements [J].Journal of Xi’an Jiaotong University(Social Science Edition),2022,42(2):103-111. [14]YIN Q.Data Elements and Data Governance:The Dual CoreDriver of the Digital Power World [J].Academic Exchange,2022(2):44-54. [15]DING X D.How to Break Through Data Trading:The Arrow Information Paradox and Legal Response in the Data Element Market [J].Oriental Law,2022(2):144-158. [16]ZHENG J H,YANG J R.The Development Path of Industrial Digitization:Complementarity,Dynamics,and Strategy [J].Industrial Economic Review,2024(6):60-71. [17]SUN J,WANG J D.The overall plan for forming a closed-loop policy of resource utilization,asset utilization,and capitalization of data elements under a multi-level market system [J].E-go-vernment,2024(2):12-20. [18]SHEN X L,QIAN Q W.Research on the Governance Dilemma and Prevention Mechanism of Data Elements from the Perspective of Value and Risk Integration [J].Journal of Information Resource Management,2023,13(6):17-28,42. [19]LI H J,ZHAO L.Research on Data Value Theory [J].Finance,Trade and Economics,2023,44(6):5-20. [20]XU Y,WANG Z C.Marketization Construction of Data Ele-ments and Digital Transformation of Enterprises-A Quasi Natural Experiment Based on Data Trading Platforms [J].Soft Science,2024,38(9):24-26,39. [21]ARROWK J.Economic Welfare and the Allocation of Re-sources for Invention[EB/OL].https://link.springer.com/chapter/10.1007/978-1-349-15486-9_13. [22]KURT R,BURNT SCHAFER H.The Solomon’s Knot:What can the law do to overcome poverty? [M].Beijing:Peking University Press,2014. [23]BERGEMANN D,BONATTIA,SMOLIN A.The Design andPrice of Information[J].American Economic Review,2018,108(1):1-48. [24]LIU Z,LI M Q,KONG J S.Selling information products:Sale Channel selection and versions trategy with network externality[J].International Journal of Production Economics,2015,166:1-10. [25]JOON-SOO Y.A Study on Data Transactions and Brokerage:Focusing on Data Prices[J].Korean Management Consulting Review,2022,22(6):279-288. [26]ZHAO Z Y,LIU Y M,LIANG X Y,et al.Consider the four party evolutionary game of product quality supervision with insi-ders whistling[J].Chinese Management Science,2024,32(2):43-53. [27]ZHU L L,RONG J M,ZHANG S Y.Three party evolutionary game and simulation analysis of drug safety and quality supervision under government reward and punishment mechanisms [J].China Management Science,2021,29(11):55-67. [28]SUN G Q,XIE Y F.Blockchain Technology,Supply Chain Networks,and Data Sharing:From an Evolutionary Game Perspective [J].Chinese Management Science,2023,31(12):149-162. |
[1] | KANG Zhenwei, LI Jing, ZHU Jianming. Tripartite Evolutionary Game Analysis of Blockchain Applications in Patent Transactions [J]. Computer Science, 2024, 51(10): 432-441. |
[2] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[3] | LI Yunzhe, DONG Peng, YE Weimin, WEN Haolin. Simulation of Equipment Procurement Model Based on Dynamic Evolutionary Game [J]. Computer Science, 2023, 50(11A): 220900051-10. |
[4] | WANG Xian-fang, ZHANG Liang, ZHANG Ning. Evolutionary Game Analysis of WeChat Health Information Quality Optimization Based on Prospect Theory [J]. Computer Science, 2022, 49(6A): 694-704. |
[5] | DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30. |
[6] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[7] | SHANG Xi-xue, HAN Hai-ting, ZHU Zheng-zhou. Mechanism Design of Right to Earnings of Data Utilization Based on Evolutionary Game Model [J]. Computer Science, 2021, 48(3): 144-150. |
[8] | WANG Pan-zao. Research on Software Development System of Internet of Things Terminal Equipment [J]. Computer Science, 2017, 44(Z6): 515-518. |
[9] | WANG Le, MAO Jian-lin, ZHU Hao-fu and GUO Ning. Evolutionary Game Theory-based Access Control Study for P-persistent CSMA Networks [J]. Computer Science, 2016, 43(9): 146-151. |
[10] | FANG Huan,FANG Xian-wen and WANG Li-li. Review of Reliability Analysis Based on Petri Nets [J]. Computer Science, 2014, 41(7): 40-44. |
[11] | . Research on Decision Stability of Evolution Model of Granular Decision [J]. Computer Science, 2012, 39(12): 237-240. |
[12] | . [J]. Computer Science, 2007, 34(3): 44-49. |
|