Author:
Qin Fang,Li Lin,Zeng Weijia,Wang Tao,Wang Can,Yu Linlin
Abstract
With the continuous development of Internet technology, more and more fields are beginning to use Internet technology to improve their business construction. Moreover, in terms of e-government construction, introducing the Internet technology into e-government work at all levels is also an important content, and the Party Central Committee has proposed a series of major decisions such as network power and “Internet +” to accelerate the process of e-government informatization. Meanwhile, big data virtualization technology and access control technology are used to break through e-government data sharing barriers to realize virtual integration and trusted sharing across e-government data and support multi-departmental, crosslevel, and cross-network data security interactive processing for e-government business collaboration. Besides, the multi-source circulation and on-demand access of cross-departmental e-government data are realized to break data barriers, form data transmission links, and create a model for exchanging and sharing e-government data. Through the exchange and sharing of e-government data, the barrier-free flow of information can be achieved and the efficiency of e-government business handling can be improved as well.
Reference12 articles.
1. Ning Jiang, Lixin Tao. A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and Integration[C]// The 5th IEEE International Conference on Cyber Security and Cloud Computing. A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and Integration[C]// The 5th IEEE International Conference on Cyber Security and Cloud Computing IEEE, 2018
2. Saeed Ebrahimijam, Cahit Adaoglu, Korhan K. GOKMENOGLU. A Synergistic Forecasting Model for High-Frequency Foreign Exchange Data[J], Social Science Electronic Publishing
3. Wu Zhixue. Advances on virtualization technology of cloud computing[J]. Advances on virtualization technology of cloud computing Journal of Computer Applications[40] Khanmohammadi S, Adibeig N, Shanehbandy S. An Improved Overlapping kMeans Clusterin
4. Shohei Hayashi, Shigenari Nakamura, Dilawaer Duolikun, et al. Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model[M]// Nutzwertanalysen in Marketing und Vertrieb. 2019.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献