用户名: 密码: 验证码:
基于J2EE的企业MIS实现技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机应用技术的发展和市场竞争加剧,开发高效、安全的企业信息系统已经成了各企业为了提高各自生存和竞争能力的重要手段之一。新型的信息系统不仅需要支持局域网下各个部门应用,更要建立基于Internet的企业间信息交互和资源共享。因此,构建新型的企业信息系统不仅需要有效利用信息资源,与遗留系统有机结合,还要考虑到系统内部事务执行的可靠性,数据操作和事务操作的安全性,系统对于业务变化所必需面对的可扩展性。
     本论文从应用系统的总体结构入手,对系统的架构进行了详细的分析,并在此基础上,结合系统中的一个模块,深入研究了应用中的安全控制机制,给出了在J2EE平台上使用JAAS框架的应用实例。
     本文是以南京跃进汽车集团冲压件厂MIS项目升级为背景完成的。
Distributed objects and World Wide Web are playing a more and more important role in the construction of enterprise distributed computing environment because the former can be used to wrap business logic and accessed through heterogeneous platforms,and the latter offer powerful abilities in the information integration and interaction with end user. The J2EE application based on web need to restrict the access to important information,provide various access rights to various users and protect the security of transmission of sensitive information. JAAS technique is a good solution.
    This paper introduces the architecture of the application,Java security model,J2EE security model and JAAS architecture,then make the Login Module design applying JAAS based on J2EE.
    This paper is based on the project "Nanjing YueJin Mobile Corp Parts Factory MIS updated" .
引文
[1] http://www.javaworld.com/javaworld/jw-O8-2001/jw-O831-jaas_p.html
    [2] http://www-900.ibm.com/developerWorks/cnljava/j-gssapi/index.shtml
    [3] http://www-900.ibm.com/developerWorks/cn/java/j-jaas/index.shtml
    [4] http://java.sun.com/security/jaas/apidoc/index.html
    [5] http://www.pramati.com/docstore/1270002/
    [6] http://www-900.ibm.com/developerWorks/lcn/java/l-j2eeSecurity/index.shtml
    [7] http://www-900.ibm.com/developerWorks/cn/java/l-j2eesecurity2/index.shtml
    [8] http://www7b.boulder.ibm.com/wsdd/library/techarticles/0110_gilmore/gilmore.html
    [9] http://www-900.ibm.com/developerWorks/cn/java/l-mvc/index.shtml
    [10] http://java.sun.com/blueprints/code/jps131/src/index.html
    [11] http://www-900.ibm. com/developerWorks/cn/java/j-javaevol/index.shtml
    [12] http://edocs.bea.com/wls/docs60/programming.html
    [13] http://newsgroups.bea.com/cgi-bin/dnewsweb?cmd=xover&group=weblogic.developer.interest.security&utag=BEA的Security新闻组
    [14] http://forum.java.sun.com/forum.jsp?forum=60Sun的Java Security论坛
    [15] DaWei, Security in J2EE.ppt, 2002.02.27
    [16] Simone Border Compaq Computer, Italy, Exploiting the Full Power of the Java Authentication and Authorization Service and the Java Technology Security Model
    [17] Inderjeet Singh, Beth Stearns, Mark Johnson, and the Enterprise Team, Designing Enterprise Applications with the J2EE Platform, Second Edition
    [18] LiGong, Java Security Security Architecture(JDK1.2)
    [19] Beth Stearns July 2001, Enterprise JavaBeans 2.0 Container-Managed Persistence Example
    [20] A.Keyton Weissinger, Director, Software Development Group Hoteltools, Constructing a Security Authorization Custom Tag Library. ppt
    [21] Deepak Alur, John Crupi, Dan Malks, Best Practices and Design Strategies
    [22] Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design Patterns, Elements of Resuable Object-Oriented Software
    
    
    [23] 张炜 微软公司MicrosoftVisual Studio.net.ppt
    [24] 张民 J2EE平台与EJB技术.ppt
    [25] 闫永梅,张跃成,Microsoft [NET]和J2EE的构成技术分析,云南电力技术,Feb.2002
    [26] Michael Girdley,Rob Woollen,Sandra L.Emerson,BEA系统(中国有限公司) J2EE应用与BEA Web Logic Server
    [27] (美)Subrahmanyam Allamaraju等著,J2EE服务器端高级编程,机械工业出版社
    [28] 网星工作室 伊晓强编写,J2EE全实例教程,北京希望电子出版社
    [29] 薛华成主编,管理信息系统(第三版),清华大学出版社

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700