Network Information Security of Library

被引:0
作者
Zhou, Ruijin [1 ]
Chang, Min [1 ]
Fang, Qiang [1 ]
机构
[1] Henan Inst Sci & Technol, Xinxiang 453003, Henan Province, Peoples R China
来源
2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3 | 2010年
关键词
library; network; information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development and widely application of modern information and network technology, digital library will become the center and hub of public information in future society. The main influence factors of network information security of library are analyzed in the paper. Some pertinence effective measures are proposed to protect information security of library. Good reference is hoped to provide for network information security construction of university library.
引用
收藏
页码:155 / 158
页数:4
相关论文
共 50 条
  • [31] A Library for Light-Weight Information-Flow Security in Haskell
    Russo, Alejandro
    Claessen, Koen
    Hughes, John
    HASKELL'08: PROCEEDINGS OF THE ACM SIGPLAN 2008 HASKELL SYMPOSIUM, 2008, : 13 - 24
  • [32] Information Security in Communication Network of Memory Channel Considering Information Importance
    Kawanaka, T.
    Rokugawa, S.
    Yamashita, H.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 1169 - 1173
  • [33] The Application of Network Anomaly Mining Technology in Campus Network Information Security
    Bin, Wang
    Zhao, Zhi-chao
    Jiang, Yong-cheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1793 - 1796
  • [34] Research on Security Management and Preventive Measures of Library Computer Network System
    Jing, Zhang
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, CIVIL ENGINEERING AND MANAGEMENT SCIENCE (ICCEMS 2018), 2018, : 227 - 230
  • [35] Study on Library Knowledge Transfer Security System Under Network Environment
    Zhao Shenghui
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON EDUCATION MANAGEMENT AND ENGINEERING, 2009, : 1253 - 1258
  • [36] Security authentication scheme based on chebyshev chaotic mapping for library network
    Xiao, Wei
    Liu, Baisong
    Yin, Wenting
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 109 : 262 - 269
  • [37] A network library system
    Namiki, I
    Kimeda, T
    Hayashi, H
    Kishida, Y
    Tachiyama, N
    Kanamaru, T
    Takeda, M
    Ohyama, M
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 2001, 84 (04): : 78 - 90
  • [38] Network and Information Security, and Intrusion Detection System Analysis
    Wu, Ying
    2013 INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATIONAL RESEARCH (EER 2013), 2013, 1 : 130 - 134
  • [39] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [40] Information Sharing and Security for a Memory Channel Communication Network
    Kawanaka, Takaaki
    Rokugawa, Shuichi
    Yamashita, Hiroshi
    INDUSTRIAL ENGINEERING AND MANAGEMENT SYSTEMS, 2018, 17 (03): : 444 - 453