Please wait a minute...
New Technology of Library and Information Service  2009, Vol. 25 Issue (6): 85-88    DOI: 10.11925/infotech.1003-3513.2009.06.17
article Current Issue | Archive | Adv Search |
The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example
Shi Hongjuan   Li Chaoyang
(Library of Renmin University of China,Beijing 100872, China)
Export: BibTeX | EndNote (RIS)      

This paper presents that the loopholes of libraries’ internal networks are great weakness of network security, and those loopholes can be solved by managing users and computers of libraries with active directory. At the same time, this paper describes concretely the implementing method and using effect of active directory in Library of Renmin University of China.

Key wordsNetwork security      Active directory     
Received: 21 April 2009      Published: 25 June 2009


Corresponding Authors: Shi Hongjuan     E-mail:
About author:: Shi Hongjuan,Li Chaoyang

Cite this article:

Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example. New Technology of Library and Information Service, 2009, 25(6): 85-88.

URL:     OR

[1] 王保中,庄军,刘侃,等.应用活动目录加强医院网络管理[J].医院数字化,2008,29(8):52-53.
[2] 曹世华.Active Directory和Kerberos的校园网络统一认证的实现[J].杭州师范学院学报,2007,6(4):310-312.
[3] 朱新星,薛学富.企业活动目录架构的设计与部署[J].计算机与数字工程,2008,36(1):57-59.
[4] 商宏图, 李红岩. Server Windows 2003 活动目录[M]. 北京:机械工业出版社, 2005.
[5] Keith B. A Developer’s Introduction to Active Directory Fede -ration Services[J]. MSDN Magazine, 2006, 21( 12) :76- 80, 83.

[1] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[2] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[3] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[4] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[5] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[6] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[7] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[8] Liu Xing. NT服务器的安全维护与故障排除[J]. 现代图书情报技术, 2003, 19(6): 85-87.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Wang Huawei. The NAT Solution of Computer Network of Library[J]. 现代图书情报技术, 2001, 17(5): 27-28.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wang Yong,Ni Bo,Yuan Qinjian, Zhu Weiyong,Liang Wei. Advances of Computer Network Technology in 20 Century[J]. 现代图书情报技术, 2000, 16(6): 14-17.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938