Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (1): 63-66    DOI: 10.11925/infotech.1003-3513.2004.01.15
Current Issue | Archive | Adv Search |
Research and Implementation of Resource Access Control in OCLC SiteSearch
Dong Li   Zheng Xiaohui   Jiang Airong
(Library of Tsinghua University, Beijing 100084, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

Access control component has becoming an important module of information service systems in modern library. Based on the research of SiteSearch Internationalization between Tsinghua University Library and OCLC, this paper analyses the Access Component of SiteSearch in detail, concludes the common mechanism of it and gives the method of implementation.

Key wordsOCLC SiteSearch      Access control      Authentication      Authorization     
Received: 28 July 2003      Published: 25 January 2004
: 

G250.76 

 
     
  TP393

 
Corresponding Authors: Dong Li     E-mail: dongli@lib.tsinghua.edu.cn
About author:: Dong Li,Zheng Xiaohui,Jiang Airong

Cite this article:

Dong Li,Zheng Xiaohui,Jiang Airong. Research and Implementation of Resource Access Control in OCLC SiteSearch. New Technology of Library and Information Service, 2004, 20(1): 63-66.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.01.15     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I1/63

1OCLC SiteSearch Documentation. http://www. sitesearch. oclc.org/helpzone/documentation.html(Accessed May.2003)
2The Java Tutorial.http://java.sun.com/docs/books/tutorial/index.html(Accessed Dec.2003)
3Java2 Platform,Standard Edition,v1.3.1 API Specification.
http://java.sun.com/j2se/1.3/docd/api(Accessed Mar.2003)
4MySQL Reference Manual.
http://www.mysql.com/documentation/index.html(Accessed May.2003)
5李爽.数字图书馆资料的访问控制问题.情报学报,2002,20(12):1292-1294,1297

[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[3] Zhuang Mei, Wang Ping, Yang Jie, Chen Hong, Wang Yifei. Construction and Application of Assistant Management System for Regulation Violation Cases in Tsinghua University Library[J]. 现代图书情报技术, 2013, 29(7/8): 132-136.
[4] Chen Wu, Qian Qing, Zhao Xiong, Ma Xuemei, Jiang Airong, Zhu Jinghui. Designing and Implementation of Tsinghua University Smart Seats Management System[J]. 现代图书情报技术, 2013, 29(10): 90-95.
[5] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[6] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[7] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[8] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[9] Wang Xiaomei. Design and Implementation of Remote Access System for National Science Library[J]. 现代图书情报技术, 2008, 24(8): 79-83.
[10] Luo Lin,Zhang Kai,Xia Zhengwei. Design and Implementation About Network Access Control of the Electronic Reading Room in the Library[J]. 现代图书情报技术, 2008, 24(4): 90-94.
[11] Zhou Aimin. Constructing an Access Platform of Digital Resources in College and University Libraries Based on Sites Mirror[J]. 现代图书情报技术, 2008, 24(11): 90-93.
[12] Tang Guangqian . A Study on Access Control System of Digital Library Portal Website[J]. 现代图书情报技术, 2007, 2(5): 45-48.
[13] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[14] Sun Hui. The Architecture of Digital Rights Management[J]. 现代图书情报技术, 2007, 2(12): 45-49.
[15] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn