Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (3): 56-59    DOI: 10.11925/infotech.1003-3513.2004.03.18
Current Issue | Archive | Adv Search |
The Security Techniques for Library Networks
Zhang Jiping   Xu Quanli   Mu Ming
(Library of Xidian University, Xi'an 710071,China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

Many library networks have been connected to the Internet. This results in that information security problems must be considered for a library network. In this paper we will present the strategies of information protection and network security management for a library network. Some security techniques, such as firewall, inbreak detection, and webpage protection, are introduced with a brief discussion on their implementation techniques, and advantages and disadvantages.

Key wordsNetwork management      Information security      Inbreak detection      Webpage protection      Backup recovery     
Received: 21 May 2003      Published: 25 March 2004
ZTFLH: 

TP393.1

 
Corresponding Authors: Zhang Jiping     E-mail: bmbai@mail.xidian.edu.cn
About author:: Zhang Jiping,Xu Quanli,Mu Ming

Cite this article:

Zhang Jiping,Xu Quanli,Mu Ming. The Security Techniques for Library Networks. New Technology of Library and Information Service, 2004, 20(3): 56-59.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.03.18     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I3/56

1WebAlarm, http://www.elock.com.my/pdetailwebalarm.htm(Accessed May 18,2003)
2Best Web Site Protect solution--Webpage Protector, http://www.share2s.com/protect.html(Accessed May 18,2003)
3J. A. Goguen , J. Meseguer, “Security policies and security models,” Oakland CA: IEEE computer society.
4赵君辉,徐琨.网页监控与恢复系统设计.北方交通大学学报,2002(1)
5刘美兰,姚京松.审计跟踪与入侵检测.计算机工程与应用,1999(7)
6如何保护您的网站? http://chengdu.ccw.com.cn/net/200210/101401.asp.(Accessed May 18,2003)
7雷峥嵘,吴为春.校园网的安全问题及策略.计算机应用研究,2002(3)
8陈沛帅,欧阳扬.网络管理的热点问题研究.计算机应用研究,2002(7)
9王常杰等.基于IPv6的防火墙设计.计算机学报,2001,24(2)
10李鸿培等.入侵检测技术的研究.通信保密,1999(3)

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[3] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[4] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[5] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[6] Lu Juemin,Zheng Yu. A Study on Software Protection of Browser in Opening  Network Management of Library[J]. 现代图书情报技术, 2005, 21(2): 94-95.
[7] He Donghong,Guo Xinhua. The Design and Implementation of the Library Network Management System Based on JSP/Servlet and JavaBeans[J]. 现代图书情报技术, 2004, 20(9): 98-100.
[8] Niu Zhendong,Shi Xuelin,Ye Chenglin. Status and Trend of Research on Standards Involved in Digital Libraries[J]. 现代图书情报技术, 2004, 20(7): 1-5.
[9] Xiang Yu,Wang Jin. Study on Application of Symantec Ghost in Network Management[J]. 现代图书情报技术, 2004, 20(3): 87-89.
[10] Li Shuning,Ma Mingxia. The Applying of Digital Watermark in Digital Library Security[J]. 现代图书情报技术, 2002, 18(1): 17-19.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Du Shouxian. The Method to Research and Construct a Local Network in the Library of Shengli Oilfield[J]. 现代图书情报技术, 2001, 17(5): 79-81.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wu Jing. Network Accounting System Base on Flux of Communication in Library[J]. 现代图书情报技术, 2001, 17(1): 75-77.
[15] Guo Xiaomiao. Information Security Protection Technology for the Internet[J]. 现代图书情报技术, 2000, 16(3): 50-51.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn