登陆注册
8931100000040

第40章 附录:非现场经济实践案例(4)

Our Digital Library application possesses the essential elements of the network-suitable group and network usage.In order to guarantee this system's continual stability within the entire operating environment,we now envisage the concept of a secure private network built upon the foundation of a communication vendor's network architecture,and realizing forward leading environmental security in the Digital Library application.

Forward leading environmental security is separating the public network from the private network through the use of VPDN channels(at the moment,point-to-point VPDN channel mode technology is mature,and is beginning to be utilized in reality).

Building these exclusive channels and overall environmental structure will be the responsibility of professional vendors(such as China Telecom,China Mobile). The VPDN channel format for which we advocate not only includes a point-to-point direct authentication channel,but also includes a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.

Its economic feature is that communication vendors undertake security responsibilities of the private network,and acts as a credible responsible party for basic security.At the same time,the vendor is a practitioner of safety economics.From the initial responsibility for security only,it can evolve into the valuable action of safety economics ,and abide by economics fair value theory.

From this component diagram,we can see that appropriate shielding of the client(various types of terminals)is necessary from its starting point. This includes separating the operation system,separating the hard drive's physical properties,moving an identity authentication system in the mobile terminal,etc.

This VPDN channel format includes not only a point-to-point direct authentication channel,but also a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.

3.Conclusion

The security of the Digital Library application not only involves managing the Digital Library's information and utilizing the Digital Library's resources,but also involves the security of information economy and the economic potential of the Digital Library.

To conclude,application demand and methods of realization are closely related.That is to say demand realization needs realizable technological means as its support.

However,utility and security are closely linked to each other;utility is built upon the foundation of secure operation.Security is the foundation of utility,but also is a part of the contents of utility.

Only upon such a foundation can we truly satisfy teacher's,student's,and education's demands,thus to launch the terminals of specialty design and application service platforms,such as:identity distinction,electronic book database,electronic textbooks,homework system,screen capture and screenshot,drag-to-download,and online electronic shops,translation engines,quotation check,exclusive web browsers,and so on.

In this way,"Digital Library Applications"research becomes valuable because of its realistic utility.

Nowadays,security within the domain of information economy is not only a necessary measure,but also an onerous application service,and has become a new economic phenomenon.It is safe to conclude that the idea of security in information economy has already surpassed the domain of safeguarding and has become an essential feature of information economy.It has become "information security economics",a branch and part of information economics.

What we advocate is that security meas ures are also a kind of service,and an important part of information economics.

As an application of off-site information economics,the industry of digital books is grounded upon the trends of off-site economic activities of mobile terminals.Its technological plan for security is especially important.

Will it stop at simply copying its predecessors,or will it utilize the principles of the east's wisdom and the west's technology to achieve independent innovation and create its own self-decisive application scheme of security technology of the information economy?

The author thinks:to start from terminals,the foundation support of and window to off-site information economy,integrate private network's exclusive established environment,and move towards integration of application service's concept of a secure private network built upon the foundation of a communication vendor's network architecture. This plan,being very high in operability under the Digital Library's established environment,is the best plan.

Reference

1.Wu,Jiapei,Xie,Kang,and Wang,Mingming.Study of Information Economics[M].Beijing:Higher Education Press.

2.Shen,Jiangying.The Dialogue on the Trend of Development of China's Telecommunications Industry[M].Beijing:Beijing Telecommunications University Press,2010.

3.Yan,Yu.Management China in C Mode[M].Beijing:Xinhua Press,2010.

4.Lou,Cequn and Gui,Xuewen.General Information Economics[M].Beijing:China Archives Press,1998.

5.Tao,Changqi.Study of Information Economics[M].Beijing:Economics Science Press,2001.

6.He,Jinshe.Economics—Back to Adam:The Happy and Harmonious Frame of Smith(Vol.1and2)[M].Shanghai:People's Press,2010.

7.Zhu,Weihua.Digital Mobile Communications Technology[M].Tianjin:University of Tianjin Press,2010.

8.Huang,Dongwei.3G Final Terminal Technology[M].Beijing:Engineering Industry Press,2009.

9.Chen,Yongjun.Electronic Business Applications and Technology[M].Beijing:Qinghua University Press,2010.

同类推荐
  • 价值发展论

    价值发展论

    马克思主义政治经济学的生命在于“发展”,本书面对当今社会生产力的日新月异,提出了价值发展论的基本构架与理论基础,这是因为现代社会中一个商品年初的价值量与年末的价值量已有了很大的差别,而在马克思那个时代这些差别是极小的。作为一本张扬作者研究观点的专著,作者在书中提出了生产力发展的速度使今天研究政治经济学的学者必须重视社会必要劳动时间的动态变化。
  • 我们房地产这些年

    我们房地产这些年

    本书记录了我国房地产业30年来的成长与发展,揭示出在城市化进程浪潮中房地产业作为城市建设管理面临的诸多新课题,为我国的城市管理研究和学习提供了很好的借鉴。
  • 中国金融体制的改革与发展

    中国金融体制的改革与发展

    我国的金融改革是在计划金融体制的基础上展开的,计划金融体制的形式和运行方式决定和制约我国金融改革的理论和实践,而计划金融体制的形式和运行方式又与计划金融体制的形成和发展有着很深的渊源,所以我们对金融改革理论和实践的认识要从计划金融体制的形成和发展开始。
  • 金权博弈

    金权博弈

    本书坚持“曝光事实真相,揭示财富黑手”的原则,详细介绍了鲜为人知的罗斯柴尔德家族对世界金融业的影响、前苏联解体及金融体系的崩溃、日本股市的崩盘、东南亚金融风暴等内容,资料翔实,论述精彩,情节跌宕起伏。
  • 低碳生活:我们未来的生活方式

    低碳生活:我们未来的生活方式

    本书共六章,内容包括:引言、中国的城市化与低碳城市构建、基于城市价值的低碳城市概念及评价指标体系、基于AHP法的35个城市低碳发展水平分析、中国特色低碳城市发展模式、结论与建议等。
热门推荐
  • 虐心恋:傲娇女神你走开

    虐心恋:傲娇女神你走开

    三界大战?死伤千万?你想多了,傲娇腹黑史上最无节操的女主,那边那个高智商低情商的动物是什么?我不认识我绝对不认识。说好的一统天使族,血族,狼族的呢?傲娇女神你走开!
  • 秋暮霞传奇悬山村

    秋暮霞传奇悬山村

    深秋,日暮,晚霞。秋暮霞,到底是怎样一个人呢?他的身后,究竟隐藏着什么秘密?又背负着怎样的命运呢?一人一剑,仗剑天涯。踏遍千山寻幽处,遨游四海探迷踪。正统武林,纯正江湖。是一种回归,也是一种尝试。
  • 无上之神尊归程

    无上之神尊归程

    吾本与天同生,掌控宇宙,不料却遭兄弟暗算,惊天大战,吾终陨落,天地同泣,却不料吾之神兵携吾之残魂破入轮回,不料四宙相连,天地气势大减,破轮回而出,活出新生,本已无意争锋,平平淡淡就好,但天却不顺人愿,大敌逼近,不得不破世重出,走上回归路,一代无上神尊再度归来……
  • 醉衣

    醉衣

    【你嫁衣如火灼伤了天涯,从此残阳烙我心上如朱砂】她爱她,为嫁给他,她不惜一切代价。她气疯了二哥,叛逆爹娘,终于嫁入了皇宫。可是他却恨她,为折磨她,他处处配合她的计划,让她如愿入了宫。殊不知当她踏入宫门的一刹那,便是命运的交错……
  • 梦逝成殇

    梦逝成殇

    在这个小说中,我所要写的都是一些很平淡,很平常的事,也许不会引起更多的关注,但我就是要把那个年代的气息与平淡幻化成文字,让曾经经历过的那些人们慢慢的去感受,也许会有那么一点点会刺痛你的心脉,让你有一丝的感动与怀念!有些事逝去后,我们恍若做了一个梦,不知所措!生活的不如意,生命的无常,让我们开始念念不忘过去,过去的忧伤成为一道美丽的殇,时刻在梦中徘徊,醒着做着未来的梦,睡着了做着自己不曾知道的梦!有时,醒着,却在做梦,有时,睡着了,仍在做梦。梦,是现实,梦,是虚幻。沉浮在人生的长河中,总希望到达人生的彼岸,而彼岸却永久的活在梦里。梦,会缓缓的走来,梦,会悄悄地逝去,走来的,总让人欣喜若狂,逝去的,总离殇在落寞的年华中!那年的暴风雨,你让我在心里埋藏下了梦,那年的麦子地头,成为永恒的梦,那年的校园里,有着一群少年狂热的梦。逝去的,到来的,都会终将过去,一曲悲壮的凯歌奏响梦的前曲,一幅荒凉的风景画描摹出梦的永恒,一盏淡淡的清茶品味出梦的醇香。啊——流年的梦,已逝去,流殇在心动的岁月中!谱写出一曲《梦逝成殇》的慨叹!
  • 乱世私宠:傲娇圣君追妻忙

    乱世私宠:傲娇圣君追妻忙

    传言说,卫国公家的嫡长女相貌奇丑水性杨花,且飞扬跋扈。传言还说,月圆之夜,母虎出世,一声怒吼,震碎众人耳膜无数————一朝穿越就得替人去死?————扯蛋!妖女?呵,是又怎样?不服,上来试试!某女回首,面若皎月目似寒潭!无心杀伐世道却要如此逼人!既是如此,那就————拔刀上呗!
  • 雷武霸天

    雷武霸天

    玄天大陆,自古修炼玄气,更有天赋出众这者,以自身的潜力沟通九天繁星,制成星图,增强战力。少年从这里出发,开始了他的传奇......
  • 陶之夭夭,总裁宠你入骨
  • 霸道总裁之小羊别跑

    霸道总裁之小羊别跑

    一头“狐狸”无意中盯上了小绵羊,这样的距离,如果追赶的话是追不到的,得让他自己过来,乖乖的让我吃掉。腹黑又心机的南宫铭,“老宫”面对防备心很强的肖寿,“小寿”,两个人的内心战正式打响,到底是老宫吃了小寿呢,还是小寿逃跑了呢?一起来关注吧!
  • 幻游战记

    幻游战记

    五千年前的“神魔封印”玛纳正在逐渐消散,幻游大陆被几名实力强大的天族、魔族闯入。天、魔两族见幻游大陆富庶荣美,便起了贪婪占据之心,然而唯一能使他们惧怕的便是拥有神魔羽翼的家族——阿奇里斯家族。且看男主角克里斯如何走上成为强者的道路,并且一一解开一切谜团。