Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (12): 78-81    DOI: 10.11925/infotech.1003-3513.2007.12.16
Current Issue | Archive | Adv Search |
The Problem and Its Improvement of Secure Login for Digital Library
Zhang YashanZhang Yuntian2
1(Library of Shaoguan University, Shaoguan 512005,China)
2( South China Education & High-Technology Company Ltd.,Guangzhou 510000,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

Under the non-credible environment, transmitting sensitive information such as plain text passwords is easy to lead to security issues of login of digital library. The paper proposes an improved solution based on a one-way Hash function, which uses information technology such as message digest and JavaScript, and sensitive information such as plain text passwords will be hashed for the fixed-length and single-effective “digital fingerprint” before entering the non-credible environment, so it can enhance present security of login of digital library.

Key wordsDigital library      Security      Login      Code      Hash function      Message digest     
Received: 11 October 2007      Published: 25 December 2007
: 

G250

 
Corresponding Authors: Zhang Yashan     E-mail: zhy.tina@gmail.com
About author:: Zhang Yashan,Zhang Yuntian

Cite this article:

Zhang Yashan,Zhang Yuntian. The Problem and Its Improvement of Secure Login for Digital Library. New Technology of Library and Information Service, 2007, 2(12): 78-81.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.12.16     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I12/78

[1] IETF. RFC2616[EB/OL].[2007-10-09]. http://www.w3.org/Protocols/rfc2616/rfc2616.
[2] IETF. What is HTML[EB/OL].(1999-12-24)[2007-10-09]. http://www.w3.org/MarkUp.
[3] Stevens W R. TCP/IP Illustrated,Volume 1:The Protocols[M]. Addison Wesley,1994.
[4] ISO. About ISO[EB/OL].[2007-10-09]. http://www.iso.org/iso/about.htm
[5] Schneier B. Applied Cryptography[M] 2nd Edition. John Wiley & Sons, 1996.
[6] Gosselin D. JavaScript:Comprehensive[M]. Thomson Learning,2004.

[1] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[2] Wang Mo,Cui Yunpeng,Chen Li,Li Huan. A Deep Learning-based Method of Argumentative Zoning for Research Articles[J]. 数据分析与知识发现, 2020, 4(6): 60-68.
[3] Feng Wengang,Jiang Zhaofeifan. Improving Security Checks and Passenger Risk Evaluation with Classification of Airline Passengers[J]. 数据分析与知识发现, 2020, 4(12): 105-119.
[4] Chen Wenjie. Predicting Research Collaboration Based on Translation Model[J]. 数据分析与知识发现, 2020, 4(10): 28-36.
[5] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[6] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[7] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[8] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[9] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[10] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[11] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[12] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[13] Guo Limin, Liu Yueru, Xiang Mingqiong. Application of WeChat QR Code in Reader Authentication[J]. 现代图书情报技术, 2015, 31(7-8): 144-147.
[14] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[15] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn