Please wait a minute...
New Technology of Library and Information Service  2001, Vol. 17 Issue (5): 18-21    DOI: 10.11925/infotech.1003-3513.2001.05.05
article Current Issue | Archive | Adv Search |
Security of Library Information and Realizing of Database Ciphering Technique
Wu Longji
(Library of Nankai University, Tianjin 300071, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper explains necessity of treasuring library information security, and in point of solving security of library information only if database ciphering. and giving realizable technology for library database ciphering.

Key wordsLibrary automation system      Library information      Database ciphering      Security     
Received: 21 March 2001      Published: 25 October 2001
ZTFLH: 

G250.7|TP311

 
Corresponding Authors: Wu Longji   
About author:: Wu Longji

Cite this article:

Wu Longji. Security of Library Information and Realizing of Database Ciphering Technique. New Technology of Library and Information Service, 2001, 17(5): 18-21.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2001.05.05     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2001/V17/I5/18


[1]Debra S.Herrmann.Software Safety and Reliability.Los Alamitos,Calif,IEEE Computer Society.1999

[2]刘希良译.反计算机犯罪,一种保护信息安全的新构架.电子工业出版社,1999

[3]公安部计算机管理检查司编著.计算机信息系统安全技术.群众出版社,1998

[4]张小斌.黑客分析与防范技术.清华大学出版社,1999

[5]林小平.关于图书馆集成系统整体安全性的思考.现代图书情报技术,1999,(1):34-37

[1] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[2] Feng Wengang,Jiang Zhaofeifan. Improving Security Checks and Passenger Risk Evaluation with Classification of Airline Passengers[J]. 数据分析与知识发现, 2020, 4(12): 105-119.
[3] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[4] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[5] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[6] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[7] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[8] Hu Tao, Wei Tao, Xu Haijun. Design and Implement Security Gateway System Based on Open Source Software Used in Electronic Reading Room[J]. 现代图书情报技术, 2012, 28(2): 92-97.
[9] Udhyan Timilsina, Leah Riungu-Kalliosaari, Ossi Taipale, Kari Smolander, Wang Weijun. Security Issues on Testing of Public Cloud Applications[J]. 现代图书情报技术, 2012, (11): 22-33.
[10] Zhu Yuqiang. Design and Implementation of Unattended Library Security Program Based on Camera Images[J]. 现代图书情报技术, 2011, 27(6): 95-100.
[11] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[12] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[13] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[14] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[15] Wei Chengfu,Wu Xu,Zhang Hua. Design and Realization of Web Application in Network Behavior Security Auditing System[J]. 现代图书情报技术, 2009, 3(2): 96-101.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn