Measures To Enforce Safety In Digital Libraries
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
The Digital Library System is an Innovation in Library Service.It is prone to Onslaughts of sabotage by Bibliophiles, Bibliophobes and Biblioklepts all alike the system itself inherent facilities which render it susceptible to the forays and ravages of the users. The Management of digital library has to be watchful wary and chary in order to avert possible embarrassments.The Digital Library Manager [1]has serious concerns in providing protection to the Noetic wealth. The conflicting needs make the problem all the more complex. A Holistic vision alone can handle the conflicting situations. The Inherent weaknesses of the Digital Library system expose it to deleterious determent as well as detritus. The security attacks may be categorized as physical attacks and Logical attacks.A physical attack involves security of Hardware – Keys, Locks, Cards and Visitor monitoring. A logical attack involves the abuse of the content of the Digital Library much due to the detriment of Intellectual Property and Authenticity. This paper focused on two aspects i.e., Content, Users.
Authors and Affiliations
Tadakamalla Sekhar, A V L V Prasad Rao, K P R Krishna Chaitanya
PARTIAL UPDATE ADAPTIVE TECHNIQUES FOR WIRELESS NETWORKS
An adaptive distributed strategy is developed based on incremental techniques. Distributed wireless sensor networks finds many remote sensing applications like battle field, surveillance, target localization, environ...
A Novel Survey on SLA based Load leveling in Cloud Computing
The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...
Comparative Study of Hand Gesture Recognition Algorithms
Gesture recognition is the technique which is employed for the interaction between human and computer or any auto. In this paper, different types of gesture recognition algorithm is being proposed. Hand detection and...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...
Data Accelerating In Wireless Sensor Networks Without Prune Delay
In this advance and fast world people do no want to wait much for collecting information.Hence now a days collecting information in a faster way became a challenge for the research. Faster data collection in WSN with...