Security Architecture of Digital Library Research in General Knowledge Environment

Article Preview

Abstract:

Ubiquitous service is a bran-new service idea and model of digital library. It emphasizes that the library should be centered on users, provide services at anytime and anywhere, and be embedded into user's work. The ubiquitous service model of digital library is mainly embodied in the mobile library service, the user environment-embedded service, the “cloud computing” -based service and the global network library service. Combined with the relevant application examples, this paper expatiates on and analyzes the basic types, characteristics and application status of digital library ubiquitous service. The Digital Library of the security threats facing and the reasons, according to OSI security architecture, examining the safety and security objectives of digital library, based on the principle of new casks, from the security strategy of several major Digital Library in the process of data security issues and propose appropriate safety measures and solutions, is intended to strengthen the library data from various aspects of information security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

601-605

Citation:

Online since:

September 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Haiyan. Principle and implementation of computernetwork security. Beijing: Mechanical Industry(2009) , in press.

Google Scholar

[2] Liu Chao. Digital Library of Information Security. Modern Information. Vol. 9 (6) . 72-75(2009).

Google Scholar

[3] Tang open, Wang Jikun. :Barrel Theory based on the new digital library network security strategy. Modern Intelligence. Vol. 29 (7). 89 – 91(2009).

Google Scholar

[4] L. Hui: Digital Library Network Security and prevention strategies. Science Educators. Vol. (9). 38-39(2009).

Google Scholar

[5] Xie . Wei, Zhang. Chun-Hong: Digital library network security technology research. Computer Knowledge and Technology. Vol. (4). 814-815(2009).

Google Scholar

[6] L. Guanhua: Digital Library Network security and defense. Information Development and Economy. Vol. 18 (15). 3-5(2008).

Google Scholar

[7] D. Xiang, Y. ShuHua: Digital Library Building of a network security system. Technology Information, Vol. (4). 254-255(2008).

Google Scholar

[8] W. Xu: Library security features and its influencing factors. Modern Information. Vol. (11). 84-86(2008).

Google Scholar