Our Digital Library application possesses the essential elements of the network-suitable group and network usage.In order to guarantee this system's continual stability within the entire operating environment,we now envisage the concept of a secure private network built upon the foundation of a communication vendor's network architecture,and realizing forward leading environmental security in the Digital Library application.
Forward leading environmental security is separating the public network from the private network through the use of VPDN channels(at the moment,point-to-point VPDN channel mode technology is mature,and is beginning to be utilized in reality).
Building these exclusive channels and overall environmental structure will be the responsibility of professional vendors(such as China Telecom,China Mobile). The VPDN channel format for which we advocate not only includes a point-to-point direct authentication channel,but also includes a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.
Its economic feature is that communication vendors undertake security responsibilities of the private network,and acts as a credible responsible party for basic security.At the same time,the vendor is a practitioner of safety economics.From the initial responsibility for security only,it can evolve into the valuable action of safety economics ,and abide by economics fair value theory.
From this component diagram,we can see that appropriate shielding of the client(various types of terminals)is necessary from its starting point. This includes separating the operation system,separating the hard drive's physical properties,moving an identity authentication system in the mobile terminal,etc.
This VPDN channel format includes not only a point-to-point direct authentication channel,but also a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.
3.Conclusion
The security of the Digital Library application not only involves managing the Digital Library's information and utilizing the Digital Library's resources,but also involves the security of information economy and the economic potential of the Digital Library.
To conclude,application demand and methods of realization are closely related.That is to say demand realization needs realizable technological means as its support.
However,utility and security are closely linked to each other;utility is built upon the foundation of secure operation.Security is the foundation of utility,but also is a part of the contents of utility.
Only upon such a foundation can we truly satisfy teacher's,student's,and education's demands,thus to launch the terminals of specialty design and application service platforms,such as:identity distinction,electronic book database,electronic textbooks,homework system,screen capture and screenshot,drag-to-download,and online electronic shops,translation engines,quotation check,exclusive web browsers,and so on.
In this way,"Digital Library Applications"research becomes valuable because of its realistic utility.
Nowadays,security within the domain of information economy is not only a necessary measure,but also an onerous application service,and has become a new economic phenomenon.It is safe to conclude that the idea of security in information economy has already surpassed the domain of safeguarding and has become an essential feature of information economy.It has become "information security economics",a branch and part of information economics.
What we advocate is that security meas ures are also a kind of service,and an important part of information economics.
As an application of off-site information economics,the industry of digital books is grounded upon the trends of off-site economic activities of mobile terminals.Its technological plan for security is especially important.
Will it stop at simply copying its predecessors,or will it utilize the principles of the east's wisdom and the west's technology to achieve independent innovation and create its own self-decisive application scheme of security technology of the information economy?
The author thinks:to start from terminals,the foundation support of and window to off-site information economy,integrate private network's exclusive established environment,and move towards integration of application service's concept of a secure private network built upon the foundation of a communication vendor's network architecture. This plan,being very high in operability under the Digital Library's established environment,is the best plan.
Reference
1.Wu,Jiapei,Xie,Kang,and Wang,Mingming.Study of Information Economics[M].Beijing:Higher Education Press.
2.Shen,Jiangying.The Dialogue on the Trend of Development of China's Telecommunications Industry[M].Beijing:Beijing Telecommunications University Press,2010.
3.Yan,Yu.Management China in C Mode[M].Beijing:Xinhua Press,2010.
4.Lou,Cequn and Gui,Xuewen.General Information Economics[M].Beijing:China Archives Press,1998.
5.Tao,Changqi.Study of Information Economics[M].Beijing:Economics Science Press,2001.
6.He,Jinshe.Economics—Back to Adam:The Happy and Harmonious Frame of Smith(Vol.1and2)[M].Shanghai:People's Press,2010.
7.Zhu,Weihua.Digital Mobile Communications Technology[M].Tianjin:University of Tianjin Press,2010.
8.Huang,Dongwei.3G Final Terminal Technology[M].Beijing:Engineering Industry Press,2009.
9.Chen,Yongjun.Electronic Business Applications and Technology[M].Beijing:Qinghua University Press,2010.