期刊文献+

OCLC SiteSearch系统资源访问控制机制的研究和实现 被引量:1

Research and Implementation of Resource Access Control in OCLC SiteSearch
下载PDF
导出
摘要 资源的访问控制系统已经成为图书馆建设信息服务系统时必须具备的一部分。本文通过清华大学图书馆与OCLC合作研究SiteSearch系统国际化项目,对SiteSearch的资源访问控制模块进行了全面的分析和研究,总结出了SiteSearch系统进行资源访问控制的一般机制和实现方法。 Access control component has becoming an important module of information service systems in modern library. Based on the research of SiteSearch Internationalization between Tsinghua University Library and OCLC, this paper analyses the Access Component of SiteSearch in detail, concludes the common mechanism of it and gives the method of implementation.
机构地区 清华大学图书馆
出处 《现代图书情报技术》 CSSCI 北大核心 2004年第1期63-66,共4页 New Technology of Library and Information Service
关键词 OCLC SiteSearch 图书馆 电子资源服务 访问控制 OCLC SiteSearch Access control Authentication Authorization
  • 相关文献

参考文献5

  • 1OCLC SiteSearch Documentation. http : //www. sitesearch. oclc.org/helpzone/documentation. html (Accessed May. 2003)
  • 2The Java Tutorial. http : //java. sun. com/docs/books/tutorial/index. html(Accessed Dec. 2003)
  • 3Java2 Platform,Standard Edition,vl. 3.1 API Specification.http://java. sun. com/j2se/1.3/docd/api(Accessed Mar. 2003)
  • 4MySQL Reference Manual.http://www. mysql. com/documentation/index. html (Accessed May. 2003)
  • 5李爽.数字图书馆资源的访问控制问题[J].情报科学,2002,20(12):1292-1294. 被引量:3

二级参考文献3

  • 1[2]Sherry L. Vellucci Metadata and Authority Control.LRTS, July 1999
  • 2[3]http: //www. china-infosec. org. cn
  • 3[4]http: //www. ccidnet. com/tech/

共引文献2

同被引文献24

  • 1邱均平,朱少强.数字图书馆版权保护技术及其规避行为的法律对策[J].情报科学,2006,24(1):1-7. 被引量:34
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3Malpas C. Cloud-sourcing research collections: Managing print in the mass-digitized library environment[ J/OL]. [ 2014 -04 -15 ]. http://open, bu. edu/ xmlui/ bitstream/ handle/2144 /13 91/2011 - 01. pdf? sequence = 1.
  • 4Si Wei. Research on copyright management of digital library[ C]// Qu Xilong, Yang Yuhang. Information and Business Intelligence. Berlin : Springer, 2012 : 707 - 712.
  • 5Cheung S C S, Sun Y L, Aberer K, et al. Special issue on privacy and trust management in cloud and distributed systems [ J ]. IEEE Transaction on Information Forensics and Security, 2013, 8 (6) : 835 - 837.
  • 6Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [C]//Dale J, Dinolt G. Proceedings of the 17th Symposium on Security and Privacy. Washington, DC: IEEE Computer Society Press, 1996:164-173.
  • 7Blaze M, Feigenbaum J, Keromytis A D. Keynote:Trust manage- ment for public-key infrastructures [ C ]//Christianson B, Crispo B, William S. Security Protocols. Berlin: Springer-Verglag, 1999: 59 - 63.
  • 8Chu Yanghua, Feigenbaum J, LaMacchia B, et al. REFEREE: Trust management for Web applications[ J]. World Wide Web Jour- nal, 1997, 2(2) : 127 -139.
  • 9Anand P M R, Bhaskar V. A unified trust management strategy for content sharing in peer-to-peer networks[ J]. Applied Mathematical Modelling, 2013, 37(4) : 1992 -2007.
  • 10Zhao Huanyu, Yang Xin, Li Xiaolin. cTrust: Trust management in cyclic mobile ad hoc networks [ J. IEEE Transactions on Vehicular Technology, 2013, 62(6): 2792-2806.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部