Matches in SemOpenAlex for { <https://semopenalex.org/work/W1542280596> ?p ?o ?g. }
Showing items 1 to 67 of
67
with 100 items per page.
- W1542280596 abstract "Security is an important issue in digital library design. Security weaknesses in digital libraries, coupled with attacks or other types of failures, can lead to confidential information being inappropriately accessed, or loss of integrity of the data stored. These in turn can have a damaging effect on the trust of publishers or other content providers, can cause embarrassment or even economic loss to digital library owners, and can even lead to pain and suffering or other serious problems if urgently needed information is unavailable (Tyrvainen, 2005). There are many security requirements to consider because of the variety of different actors working with a digital library. Each of these actors has different security needs (Chowdhury & Chowdhury, 2003). Thus, a digital library content provider might be concerned with protecting intellectual property rights and the terms of use of content, while a digital library user might be concerned with reliable access to content stored in the digital library. Requirements based on these needs sometimes are in conflict, which can make the security architecture of a digital library even more complex. The design of the security architecture of a digital library must go beyond simply adding one or a few modules to a previously designed system. This is because there may be security holes in pre-existing modules, and because difficulties can arise when attempting to integrate the modules. The security architecture of a digital library must be designed so that security concerns are handled holistically. A security system designer must view the whole architecture and consider all of the applicable security factors when designing a secure digital library. The nature of a security attack may differ according to the architecture of the digital library; a distributed digital library has more security weaknesses than a centralized digital library. Security attacks can be categorized as physical attacks and logical attacks (Stallings, 2006). A physical attack involves hardware security where keys, locks, cards, and visitor monitoring is used. A logical attack involves an attack on the content or digital library system. We focus on the logical attacks and software security of digital libraries." @default.
- W1542280596 created "2016-06-24" @default.
- W1542280596 creator A5049148461 @default.
- W1542280596 creator A5067255811 @default.
- W1542280596 date "2011-04-04" @default.
- W1542280596 modified "2023-10-18" @default.
- W1542280596 title "Security and Digital Libraries" @default.
- W1542280596 cites W1505014760 @default.
- W1542280596 cites W1517472718 @default.
- W1542280596 cites W1575642188 @default.
- W1542280596 cites W1631796333 @default.
- W1542280596 cites W1969965528 @default.
- W1542280596 cites W1990719527 @default.
- W1542280596 cites W1997199359 @default.
- W1542280596 cites W2004276548 @default.
- W1542280596 cites W2023427252 @default.
- W1542280596 cites W2036177893 @default.
- W1542280596 cites W2053349282 @default.
- W1542280596 cites W2106539366 @default.
- W1542280596 cites W2138760583 @default.
- W1542280596 cites W2147235282 @default.
- W1542280596 cites W2149772545 @default.
- W1542280596 cites W2154911336 @default.
- W1542280596 cites W2159038392 @default.
- W1542280596 cites W2165878764 @default.
- W1542280596 cites W2169761576 @default.
- W1542280596 cites W2186983741 @default.
- W1542280596 cites W2402863071 @default.
- W1542280596 cites W2541500802 @default.
- W1542280596 cites W2914268238 @default.
- W1542280596 cites W3142067920 @default.
- W1542280596 cites W329998640 @default.
- W1542280596 doi "https://doi.org/10.5772/15762" @default.
- W1542280596 hasPublicationYear "2011" @default.
- W1542280596 type Work @default.
- W1542280596 sameAs 1542280596 @default.
- W1542280596 citedByCount "5" @default.
- W1542280596 countsByYear W15422805962014 @default.
- W1542280596 countsByYear W15422805962016 @default.
- W1542280596 countsByYear W15422805962019 @default.
- W1542280596 countsByYear W15422805962022 @default.
- W1542280596 crossrefType "book-chapter" @default.
- W1542280596 hasAuthorship W1542280596A5049148461 @default.
- W1542280596 hasAuthorship W1542280596A5067255811 @default.
- W1542280596 hasBestOaLocation W15422805961 @default.
- W1542280596 hasConcept C38652104 @default.
- W1542280596 hasConcept C41008148 @default.
- W1542280596 hasConceptScore W1542280596C38652104 @default.
- W1542280596 hasConceptScore W1542280596C41008148 @default.
- W1542280596 hasLocation W15422805961 @default.
- W1542280596 hasLocation W15422805962 @default.
- W1542280596 hasOpenAccess W1542280596 @default.
- W1542280596 hasPrimaryLocation W15422805961 @default.
- W1542280596 hasRelatedWork W2096946506 @default.
- W1542280596 hasRelatedWork W2350741829 @default.
- W1542280596 hasRelatedWork W2358668433 @default.
- W1542280596 hasRelatedWork W2376932109 @default.
- W1542280596 hasRelatedWork W2382290278 @default.
- W1542280596 hasRelatedWork W2390279801 @default.
- W1542280596 hasRelatedWork W2748952813 @default.
- W1542280596 hasRelatedWork W2764151937 @default.
- W1542280596 hasRelatedWork W2899084033 @default.
- W1542280596 hasRelatedWork W3004735627 @default.
- W1542280596 isParatext "false" @default.
- W1542280596 isRetracted "false" @default.
- W1542280596 magId "1542280596" @default.
- W1542280596 workType "book-chapter" @default.