Please wait a minute...
New Technology of Library and Information Service  2012, Vol. 28 Issue (7): 121-126    DOI: 10.11925/infotech.1003-3513.2012.07.19
Current Issue | Archive | Adv Search |
Research and Implementation of Library WLAN Unified Authentication System
Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo
Xi’an Jiaotong University Library, Xi’an 710049, China
Download: PDF(765 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  This paper introduces the current application status of wireless LAN in library, analyzes the necessity of the use of open source software to develop WLAN authentication system, then describes the wireless network authentication system design and implementation process, and summarizes the use of WLAN authentication system.
Key wordsOSS      Authentication      WLAN      Integrated library management system     
Received: 30 May 2012      Published: 11 October 2012
: 

TP393

 

Cite this article:

Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System. New Technology of Library and Information Service, 2012, 28(7): 121-126.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2012.07.19     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2012/V28/I7/121

[1] 耶健,邵晶,阎晓弟. WLAN安全与网管技术在大学图书馆无线局域网的应用[J]. 现代图书情报技术 , 2006(7):85-88.(Ye Jian, Shao Jing, Yan Xiaodi. Application of WLAN Security and Network Management Technology in University Library[J]. New Technology of Library and Information Service,2006(7):85-88.)

[2] Mamakos L, Lidl K, Evarts J, et al. IETF RFC2516-1999,A Method for Transmitting PPP over Ethernet(PPPoE)[S].

[3] IEEE Std. 802.1x-2001,Port Based Network Access Control Protocol[S].

[4] 肖义.3种接入认证技术的浅析与比较[J]. 光通信研究 ,2006(3):25-28.(Xiao Yi. Analysis and Comparison of Three Types of Authentication Technique for Access Networks[J].Study on Optical Communications,2006(3):25-28.)

[5] Rigney C, Willens S, Livingston, et al. IETF RFC2865,Remote Authentication Dial in User Service (RADIUS)[S].

[6] FreeRADIUS. The FreeRADIUS Project[EB/OL].[2012-07-03]. http://freeradius.org/index.html.

[7] DMA Softlab LLC. Radius Manager 3 User’s Manual(Version 3.9)[EB/OL].[2012-07-03]. http://www.dmasoftlab.com/cont/documents/user_manual_3.9.pdf.

[8] Innovative Interfaces Inc. Innovative Technical Documentation[EB/OL].[2012-07-03]. http://techdocs.iii.com/.
[1] Jiaxin Ye,Huixiang Xiong. Recommending Personalized Contents from Cross-Domain Resources Based on Tags[J]. 数据分析与知识发现, 2019, 3(2): 21-32.
[2] Xiangdong Li,Fan Gao,Youhai Li. Categorizing Documents Automatically within Common Semantic Space[J]. 数据分析与知识发现, 2018, 2(9): 66-73.
[3] Dan Wu,Liuxing Lu. Semantic Changes of Queries from Cross-device Searching[J]. 数据分析与知识发现, 2018, 2(8): 69-78.
[4] Chuanming Yu,Bolin Feng,Lu An. Sentiment Analysis in Cross-Domain Environment with Deep Representative Learning[J]. 数据分析与知识发现, 2017, 1(7): 73-81.
[5] Mingxuan Huang. Cross Language Information Retrieval Model Based on Matrix-weighted Association Patterns Mining[J]. 数据分析与知识发现, 2017, 1(1): 26-36.
[6] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[7] Heng Ding, Wei Lu. A Study on Correlation-based Cross-Modal Information Retrieval[J]. 现代图书情报技术, 2016, 32(1): 17-23.
[8] Guo Limin, Liu Yueru, Xiang Mingqiong. Application of WeChat QR Code in Reader Authentication[J]. 现代图书情报技术, 2015, 31(7-8): 144-147.
[9] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[10] Yang Lin, Li Jiao, Hou Li, Qian Qing. Cross-disciplinary Data Curation Workflow: A Case Study of Environmental Health Data[J]. 现代图书情报技术, 2015, 31(12): 80-88.
[11] Hao Hui. A Duplicate Removal Algorithm of Cross-database Search Based on Sci-tech Novelty Retrieval[J]. 现代图书情报技术, 2015, 31(1): 89-95.
[12] Qin Ying. Applying Bilingual Lexicons to Detect Correspondences in English-Chinese Cross-lingual Plagiarism Documents[J]. 现代图书情报技术, 2014, 30(7): 114-119.
[13] Deng Sanhong,Wan Jiexi,Wang Hao,Liu Xiwen. Experimental Study of Multilingual Text Clustering[J]. 现代图书情报技术, 2014, 30(1): 28-35.
[14] Zhang Zhiwu. Sentiment Analysis of Product Reviews by means of Cross-domain Transfer Learning[J]. 现代图书情报技术, 2013, (6): 49-54.
[15] Niu Yazhen, Zhu Zhongming. Overview about the Methods of Cross-system User Modeling for Personalization Service[J]. 现代图书情报技术, 2012, 28(5): 1-6.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn