Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (12): 78-81    DOI: 10.11925/infotech.1003-3513.2007.12.16
Current Issue | Archive | Adv Search |
The Problem and Its Improvement of Secure Login for Digital Library
Zhang YashanZhang Yuntian2
1(Library of Shaoguan University, Shaoguan 512005,China)
2( South China Education & High-Technology Company Ltd.,Guangzhou 510000,China)
Download: PDF(359 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

Under the non-credible environment, transmitting sensitive information such as plain text passwords is easy to lead to security issues of login of digital library. The paper proposes an improved solution based on a one-way Hash function, which uses information technology such as message digest and JavaScript, and sensitive information such as plain text passwords will be hashed for the fixed-length and single-effective “digital fingerprint” before entering the non-credible environment, so it can enhance present security of login of digital library.

Key wordsDigital library      Security      Login      Code      Hash function      Message digest     
Received: 11 October 2007      Published: 25 December 2007
: 

G250

 
Corresponding Authors: Zhang Yashan     E-mail: zhy.tina@gmail.com
About author:: Zhang Yashan,Zhang Yuntian

Cite this article:

Zhang Yashan,Zhang Yuntian. The Problem and Its Improvement of Secure Login for Digital Library. New Technology of Library and Information Service, 2007, 2(12): 78-81.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.12.16     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I12/78

[1] IETF. RFC2616[EB/OL].[2007-10-09]. http://www.w3.org/Protocols/rfc2616/rfc2616.
[2] IETF. What is HTML[EB/OL].(1999-12-24)[2007-10-09]. http://www.w3.org/MarkUp.
[3] Stevens W R. TCP/IP Illustrated,Volume 1:The Protocols[M]. Addison Wesley,1994.
[4] ISO. About ISO[EB/OL].[2007-10-09]. http://www.iso.org/iso/about.htm
[5] Schneier B. Applied Cryptography[M] 2nd Edition. John Wiley & Sons, 1996.
[6] Gosselin D. JavaScript:Comprehensive[M]. Thomson Learning,2004.

[1] Longjia Jia,Bangzuo Zhang. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[2] Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[3] Wen’gang Feng,Yan Li,Fuhai Li,Xin Wang,Xiping Zhou. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[4] Wengang Feng,Jing Huang. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[5] Yunfei Qi,Yuxiang Zhao,Qinghua Zhu. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[6] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[7] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[8] Guo Limin, Liu Yueru, Xiang Mingqiong. Application of WeChat QR Code in Reader Authentication[J]. 现代图书情报技术, 2015, 31(7-8): 144-147.
[9] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[10] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[11] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[12] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[13] Li Shanjie. Application and Implementation of Two-dimensional Bar Code on Library Book Inquiry Machine[J]. 现代图书情报技术, 2014, 30(1): 97-101.
[14] Hu Changping, Chen Guo. A New Feature Selection Method Based on Term Contribution in Co-word Analysis[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[15] Yang He, Yang Yihong, Li Ning. Construction of Keywords-Chinese Library Classification Codes Integrated Thesaurus[J]. 现代图书情报技术, 2013, 29(7/8): 107-113.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn