Please wait a minute...
New Technology of Library and Information Service  2000, Vol. 16 Issue (5): 7-11    DOI: 10.11925/infotech.1003-3513.2000.05.02
article Current Issue | Archive | Adv Search |
Access Management of Virtual Information Resources Systems
Zhang Xiaolin
(Department of Information Management, Sichuan University, Chengdu)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper describes the access management in virtual information resource syste ms, analyzes its concepts, functions, and technical mechanisms, gives illustrati ve examples.

Key wordsVirtual information resource systems      Resource sharing systems      Access management      Authentication      Authorization     
Received: 20 March 2000      Published: 25 October 2000
Corresponding Authors: Zhang Xiaolin   
About author:: Zhang Xiaolin

Cite this article:

Zhang Xiaolin. Access Management of Virtual Information Resources Systems. New Technology of Library and Information Service, 2000, 16(5): 7-11.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2000.05.02     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2000/V16/I5/7

1 张晓林.网络环境下的文献资源共享.世纪之交图书馆事业回顾与展望.北京图书馆出版社,1999,7
2 张晓林.学术信息交流体系的重组与大学信息服务模式的再造.大学图书馆学报.2000,(1)
3 张晓林 党跃武 李桂华.网络化数字化基础上的学术信息交流体系及其影响.图书馆,待发
4 Oher,John.The California Digital Library.D-Lib Magazine,March1999(http://www.dlib.org/dlib/papers/march99/( )9ober.html,参见http://www.cdlib.org)
5 Virtual Library of Virginia(http://www.viva.va.us)
6 CIC Virtual Electronic Library(http://NTX2.cso.uiuc.edu/cic/cli/accessvel.html)
7 Galileo(http://www.galileo.peachnet.edu/galileo)
8 SEIR(http://www.co.calstate.edu/irt/seir/)
9 Lynch,Clifford.A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked
Information Resources.Coalition for Networked Information,1998
10 Secure Socket Layer(http://home.netscape.com/eng/ssl3/index.html)
11 Neuman.B.C.and Tso,T,Kerberos:An Authentication Service for Computer Networks.IEEE Communications.32(9):33-38,
Sept,1994
12 Kohl,J.T.and Neuman,B.C.The Keberos Network Authentication Service,Internet RFC1510,Sept,1993(http://www.cis.ohio-state.edu/htbin/frc/rfc1510.html    
13 RFC 2459.Internet X.509Public Key Infrastructure.(http://www.cis.ohio-state.edu/htbin/frc/rfc2459.html)
14 ITU-T Recommendation X.5O9(1997E):Information Technology-Open Systems Interconnection-The Directory:
Authentication Framework,1997
15 Proquest’SAccess Plans.(http://www.umi.com/hp/Support/PQD/)
16 GALILEO Access Policies.(http://www.peachnet.edu/galileo/accesspol.html)
17 Indiana’s Virtual Library Inspire(http://www.inspire-indian.net/)
18 Wiseman,Norman.Implementinga National Access Mmagement System for EIectronic Scrvices.D-Lib Magazine,March.1998(http://www.dlib.org/dlib/papers/march98/03wiseman.html)
19 ATHENS(http://www.athens.ac.uk/)
20 National Electronic Site License Initiative.(http://www.nesli.ac.uk/)
21 SwetsNet.(http://www.swetsnet,nl北美http://www.swetsnet.com/)
22 Glenn,A. And Millman,D.Access Management of Web-based Service.D-Lib Magazine,Sept.1998(http://www,dIib.org/dlib/papers/sept98/09glenn.html)
23 University of California Authentication& Authorization Architecture,1998
24 University of Colorado ISSCS.UMS Public Key Infrastructure Analysis.1998
25 Carnegie Mellon University NetBill.(http://www.ini.cmu.edu/netbill/)
26 Oscar PKI project(http://www.dstc.qut.edu.au/MSU/projects/pki/index.html)

 

[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[3] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[4] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[5] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[6] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[7] Wang Xiaomei ,Chen Lesi,Li Yu. Design and Implementation of Distributed Secure Proxy System for “Access Anywhere”[J]. 现代图书情报技术, 2008, 24(9): 78-82.
[8] Wang Xiaomei. Design and Implementation of Remote Access System for National Science Library[J]. 现代图书情报技术, 2008, 24(8): 79-83.
[9] Jiang Qi,Wang Qun. Shibboleth System: A Case Study[J]. 现代图书情报技术, 2007, 2(9): 44-48.
[10] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[11] Xue Ji,Ma Ziwei . The Analysis and Implementation of the Relative Theory and Technology in the Information Portal of Digital Library[J]. 现代图书情报技术, 2006, 1(6): 6-10.
[12] Chen Zhiqing,Liu Dan . Remote Access to Licensed E-resources of Library Based on  Web Access Management[J]. 现代图书情报技术, 2006, 1(10): 71-73.
[13] Huang Jizheng. Design and Implement of Radius Server Using in VPN Authentication in Linux Environment[J]. 现代图书情报技术, 2005, 21(7): 22-24.
[14] Zhu Zhongming,Tang Runhuan. Application of Mobile IP to Digital Library[J]. 现代图书情报技术, 2004, 20(12): 10-13.
[15] Dong Li,Zheng Xiaohui,Jiang Airong. Research and Implementation of Resource Access Control in OCLC SiteSearch[J]. 现代图书情报技术, 2004, 20(1): 63-66.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn