I think you're deluded if you think "Joe Public" is more of a hazard than the student body, but this whole "network thing" needs to be rethought anyway.
Large networks really need to be treated more like the public Internet. You just don't have anywhere near the control or internal trust you might think you do. The hoary old DMZ model just does not work for large networks, but then again it was never meant to. The answer is decentralization into separate networks, each one having its own DMZs and such as required based upon sensitivity.
A giant, homogenous, internal network is an accident waiting to happen. In many large networks this did happen recently with the Blaster worm. One infected laptop connects internally and *bang!* all of your clever firewalling sitting "out front" was for nought.
You need to treat your campus-wide backbone network as a hostile environment. The only safe sandboxes are small sandboxes. Think of a seagoing hull. You don't want one big buoyancy chamber - get one hole and you're sunk.
The trick is figuring out the appropriate granularity for general-use networks (offices, dorms, classroom/lab buildings, etc.), special security requirements for other facilities (academic records, payroll and accounting, sensitive research, data warehouses), and then trading it off against costs and complexity. A major refit I know, but one that can be done incrementally.
Where you take the big hit is in the area of what you can allow to flow. Just like a home user shouldn't expose file services, general RPC access, etc. to the public Internet, you don't want them across your backbone either. Now you have to consider VPNs and such within the campus and/or move workgroup members into the same physical "sandbox" network. Ain't networking fun in a hostile world?
The upside of this is that if you can make it work, your wireless security headaches are limited too. Any given access point only provides blanket access into the one sandbox it is attached to, and the other sandboxes only trust it to a limited extent.
You're right though, I'm not finding supporting papers on such alternatives either.