登陆注册
8931100000040

第40章 附录:非现场经济实践案例(4)

Our Digital Library application possesses the essential elements of the network-suitable group and network usage.In order to guarantee this system's continual stability within the entire operating environment,we now envisage the concept of a secure private network built upon the foundation of a communication vendor's network architecture,and realizing forward leading environmental security in the Digital Library application.

Forward leading environmental security is separating the public network from the private network through the use of VPDN channels(at the moment,point-to-point VPDN channel mode technology is mature,and is beginning to be utilized in reality).

Building these exclusive channels and overall environmental structure will be the responsibility of professional vendors(such as China Telecom,China Mobile). The VPDN channel format for which we advocate not only includes a point-to-point direct authentication channel,but also includes a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.

Its economic feature is that communication vendors undertake security responsibilities of the private network,and acts as a credible responsible party for basic security.At the same time,the vendor is a practitioner of safety economics.From the initial responsibility for security only,it can evolve into the valuable action of safety economics ,and abide by economics fair value theory.

From this component diagram,we can see that appropriate shielding of the client(various types of terminals)is necessary from its starting point. This includes separating the operation system,separating the hard drive's physical properties,moving an identity authentication system in the mobile terminal,etc.

This VPDN channel format includes not only a point-to-point direct authentication channel,but also a joint authentication channel mode at the application level.It is not only the secure service,but also includes various application content services under the premise of security.

3.Conclusion

The security of the Digital Library application not only involves managing the Digital Library's information and utilizing the Digital Library's resources,but also involves the security of information economy and the economic potential of the Digital Library.

To conclude,application demand and methods of realization are closely related.That is to say demand realization needs realizable technological means as its support.

However,utility and security are closely linked to each other;utility is built upon the foundation of secure operation.Security is the foundation of utility,but also is a part of the contents of utility.

Only upon such a foundation can we truly satisfy teacher's,student's,and education's demands,thus to launch the terminals of specialty design and application service platforms,such as:identity distinction,electronic book database,electronic textbooks,homework system,screen capture and screenshot,drag-to-download,and online electronic shops,translation engines,quotation check,exclusive web browsers,and so on.

In this way,"Digital Library Applications"research becomes valuable because of its realistic utility.

Nowadays,security within the domain of information economy is not only a necessary measure,but also an onerous application service,and has become a new economic phenomenon.It is safe to conclude that the idea of security in information economy has already surpassed the domain of safeguarding and has become an essential feature of information economy.It has become "information security economics",a branch and part of information economics.

What we advocate is that security meas ures are also a kind of service,and an important part of information economics.

As an application of off-site information economics,the industry of digital books is grounded upon the trends of off-site economic activities of mobile terminals.Its technological plan for security is especially important.

Will it stop at simply copying its predecessors,or will it utilize the principles of the east's wisdom and the west's technology to achieve independent innovation and create its own self-decisive application scheme of security technology of the information economy?

The author thinks:to start from terminals,the foundation support of and window to off-site information economy,integrate private network's exclusive established environment,and move towards integration of application service's concept of a secure private network built upon the foundation of a communication vendor's network architecture. This plan,being very high in operability under the Digital Library's established environment,is the best plan.

Reference

1.Wu,Jiapei,Xie,Kang,and Wang,Mingming.Study of Information Economics[M].Beijing:Higher Education Press.

2.Shen,Jiangying.The Dialogue on the Trend of Development of China's Telecommunications Industry[M].Beijing:Beijing Telecommunications University Press,2010.

3.Yan,Yu.Management China in C Mode[M].Beijing:Xinhua Press,2010.

4.Lou,Cequn and Gui,Xuewen.General Information Economics[M].Beijing:China Archives Press,1998.

5.Tao,Changqi.Study of Information Economics[M].Beijing:Economics Science Press,2001.

6.He,Jinshe.Economics—Back to Adam:The Happy and Harmonious Frame of Smith(Vol.1and2)[M].Shanghai:People's Press,2010.

7.Zhu,Weihua.Digital Mobile Communications Technology[M].Tianjin:University of Tianjin Press,2010.

8.Huang,Dongwei.3G Final Terminal Technology[M].Beijing:Engineering Industry Press,2009.

9.Chen,Yongjun.Electronic Business Applications and Technology[M].Beijing:Qinghua University Press,2010.

同类推荐
  • 中国证券业产业组织与政策研究

    中国证券业产业组织与政策研究

    本书通过经纪业务佣金率、承销费用率对证券业的市场行为进行定量分析,同时还在搜集整理了大量案例的基础上进行了深入的案例分析,解决了目前对中国证券业市场行为的研究缺乏定量分析和案例分析的问题。
  • 权利的轨迹:大转折时代的政治经济学

    权利的轨迹:大转折时代的政治经济学

    本书是作者多年来对于政治经济学和企业经济学进行教学和研究的成果。作者在本书中采用了沿着资源配置的轨迹、以资源配置过程中所形成的实际权利关系作为研究重点的写作方法和体系。通过对于消费、生产及分配诸环节的互动研究,努力揭示权利关系形成的原因及其演变的轨迹,并对权利不对称下所出现的种种问题作了对策性的思考。
  • 转轨时期中国货币政策不同作用渠道的效应研究

    转轨时期中国货币政策不同作用渠道的效应研究

    本书探讨了转轨时期的中国货币与产出的关系,货币政策的利率渠道效应,我国的信贷渠道效应,城乡二元分割条件下货币政策对农业部门的经济效应等。
  • 中国经济研究报告:2006~2007

    中国经济研究报告:2006~2007

    这些研究报告都选自中国社会科学院经济学部主办的不定期内部刊物《中国经济研究报告》。该刊于2005年问世,迄今已经出版了近80期。该刊主要刊登我院学者完成的有关我国经济发展中的重大理论和现实问题的研究报告(含调查报告、考察报告等),不定期发行。为了扩大这些研究报告的社会影响,我们每年都从该刊上选编一些研究报告编辑成册,公开出版。
  • 钱眼里的历史风云

    钱眼里的历史风云

    本书以事实为据,以事件为轴,讲述二十世纪前半叶的中国历史色彩斑驳,频繁交换的城头王旗下,涌动着无数次不动声色的挣钱与花钱行动。
热门推荐
  • 特工王妃,佣兵大小姐

    特工王妃,佣兵大小姐

    没想到有朝一日,自己竟然会穿越!可为什么是一个白痴加废物呢?不行,我要咸鱼翻身!啊呸,什么咸鱼!……看我怎么强大复仇!
  • 佣兵之我是恶魔

    佣兵之我是恶魔

    古时,有一传说,佣兵之王打败并封印了一只为祸人间的恶魔,取恶魔之力,铸造十把钥匙,分散于世界各处,使其不能相聚,因为一旦相聚,恶魔将有可能重现人间,于是,人们把十把钥匙收藏起来,后来有人发现钥匙里拥有很强大的力量,于是,人们为了得到力量为己所用,一场场战争随之而来.........
  • 开学会见他

    开学会见他

    “爱情?是什么,我不知道。”蓝舞莹嘟嚷着。“爱情,就是两个人都要付出,像你这种多管闲事的人是不懂得!”王白启说道。“你又懂?再说了,我多管闲事是我的事好吗?你不懂啊。你又没有谈过恋爱。”蓝舞莹说道。“可是我有喜欢的人啊。”冰山冷男怎么变成矮逗了!切……
  • 黑夜奇谈

    黑夜奇谈

    神秘的住户入住小区,却引发了一连串诡异的事件。究竟那个人是谁,他又有什么目的呢……
  • 网王丑女重生

    网王丑女重生

    当一位默默无闻的25岁的丑女重生到了她的小时候,她决定从小做起,长大后千万不再做丑女了,然后要低调,千万别引起别人的注意,像上辈子那样做个默默无闻的女人。可是,你!还有你!别靠近我,都给你们我的平静校园生活毁了。越前龙马;“刚开始不知道为什么总觉得很熟悉,开始注意到那个女人,不明白她为什么存在感那么低,明明那么高。不过,到了最后,我慢慢的发现这份感情已经开始变质了”不二周助;“小千这个人真有趣呢我不会放手的!”网王众;“我们也不会放手的!”
  • 步澄一日变身记

    步澄一日变身记

    她是步澄,她每天的生活都很有趣,因为她有个很神奇的能力,一天一个身份。有时她是医生,但她的病人总是不会乖乖听话,甚至有时很危险;有时她是画家,但总有怪人打扰她的作画,即使画出来了那些画中生物却……;有时她又是保镖,可被保护的人总是太能折腾让她无从下手,使她总是疲于奔波……她每天都有一个身份,她要做的就是好好去做当天该做的事,因为就算她不愿意,她也会被牵连其中。每天一早醒来,步澄最先想的事就是,今天我又是什么人?她还有些神奇的室友,一个魔法师,一个能让时间停止,最后一个则是害怕影子的胆小鬼。她们都很讨厌一个人,郝兴!说是好心,其实最坏的就是他了!郝兴总说,“步澄不成,是说你做什么都不成吧?连这点事都做不好。谁取得名啊?我得好好去感谢一下人家。”
  • 鬼医绝毒之妖孽凰妃

    鬼医绝毒之妖孽凰妃

    “没错,本小姐独占药界,和我作对绝对会收到你这辈子都没收到过的礼物”
  • 武破晨曦

    武破晨曦

    他,身负重振家族重任,与生俱来的天赋让他非同常人,与他同出的绝世功法,注定让他站上大陆颠峰,武天地,碎虚空,神兽为伍,红颜作伴,看他怎样踏破红尘,登上颠峰!第一次写书,望各位读者多多支持啊!等级排行:凝气境,武气境,武元境,破武境,武地境,破天境,武极境,凝空境,破虚境,晨曦境。新书真的不容易,求鼓励,在此求推荐,收藏!
  • 天劫之一梦千年

    天劫之一梦千年

    水神共工和火神祝融大战后,水神怒触不周神山,继而导致天地变色,风云突变。四方恶灵从地底冒出。女娲娘娘用神力,将四方恶灵再次封印起来。但是只能换来暂时的平静。以四方恶灵为首的步涯的逃脱,让人间危机四伏。煦尧临危受命,投胎下凡尘,一路上,斩妖除魔。步涯几千年销声匿迹,实则藏匿于海外永夜之国。
  • 契约小新娘:盛宠甜妻

    契约小新娘:盛宠甜妻

    都说女追男隔层纱,可她追他的时候他们之间隔着万水千山!结婚两年,他对她忽冷忽热,又和她缠绵悱恻,但他的心里最爱的是那个她!当初恋情人登门入室,阴谋阳谋轮翻伤她,他帮的依然是那个她!这场伪恋,她输得一败涂地,她恨他入骨,可到头来,他却发现自己早已爱她入髓!