期刊文献+

基于J2EE技术的政府采购系统的设计与实现 被引量:5

Design and Implementation for Government Stock System Based on J2EE Technology
下载PDF
导出
摘要 采购系统的设计以J2EE技术为指导,设计并实现了一个B/S结构的3层电子政务应用框架。系统通过Portal用户管理、Web层和EJB层结合的安全框架,保证了操作的安全性,并实现了便于扩展的统一的数据访问接口。系统在广东省政府采购中心的使用中表明设计是可行有效的。 The design of the stock system is directed by the J2EE technology. It implements a 3-level E-government application architecture with B/S structure. The security of the stock operations is also ensured by the security framework which is combined with portal user management, Web level and EJB level. The system implements an expandable generic data access interface. The application of the stock system used in Guangdong province shows that the system design is feasible and effective.
作者 刘宇 胡建平
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第8期195-197,229,共4页 Computer Engineering
关键词 政府采购 J2EE 安全 通用数据访问 Government stock J2EE Security Generic data access
  • 相关文献

参考文献3

二级参考文献12

  • 1徐良贤.计算机网络与互联网[M].北京:电子工业出版社,1988..
  • 2李晔.管理信息系统原理与实践[M].北京:电子工业出版社,1986..
  • 3[1]Abadi M, Burrows M, Lampson B, et al. A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 1993; 15 (4): 706 -734
  • 4[2]Ferriaolo D, Cugini J , Kuhn R. Role- based access control (RBAC): Features and motivations. Proceedings of 1 lth Annual Computer Security Application Conference, New Orleans , LA, De cember 11 - 15, 1995:241 - 248
  • 5[3]Ferriaolo D, Kuhn R. Role - based access controls. Proceedings of 15th NIST-NCSC National Computer Security Conference, Baltimor, MD, October 13 - 16, 1992:554-563
  • 6[4]Sandhu R, Bhamidipati V. Role - based administration of user -role assignment: The UR97 model and its Oracle implementation.Proceedings of IFIP WG11. 3 Wokshop on Data Security, August,1997
  • 7[5]Sandhu R S, Coyne E J, Feinstein H L, et al. Role - based access control models. IEEE Computer, 1996; 29 (2): 38 - 47, February
  • 8[6]Barkley J, Cincotta A V, Ferraiolo D F, et al. Role Based Access Control for the World Wide Web. April, 1997
  • 9[7]Barkley J. Comparing Simple Role Based Access Control Models and Access Control Lists. August, 1997
  • 10[8]Neuman B C. Proxy - Based Authorization and Accounting for Dis tributed Systems. Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993

共引文献16

同被引文献26

  • 1赫宜.基于Web的高校科研仪器设备管理信息系统[J].电脑知识与技术(过刊),2007(16):936-937. 被引量:1
  • 2傅冬绵,蔡林峰.基于Web的招投标采购系统的设计与开发[J].微机发展,2004,14(9):78-80. 被引量:2
  • 3徐罡,黄涛,刘绍华,叶丹.分布应用集成核心技术研究综述[J].计算机学报,2005,28(4):433-444. 被引量:75
  • 4朱少平,杨晋明.中华人民共和国国政府采购法[M].北京:中国物价出版社,2002:25-29.
  • 5S Deloach. Multiagent Systems Engineering A Methodology and Language for Designing Agent systems[ J]. Proc Of Agent Oriented Information Systems, 1999:45 - 47.
  • 6J Case, M Fedor, M Schoffstall. Simple Network Management Protocol(SNMP) [ M ]. RFC1157,1990 : 17 - 21.
  • 7S Deloach. Muhiagent Systems Engineering A Methodology and Language for Designing Agent systems [ J ]. Proc Of Agent Oriented Information Systems, 1999:45 - 47.
  • 8AllamarajuS 马树奇译.J2EE编程指南(1.3版)[M].北京:电子工业出版社,2002..
  • 9Allen P,Bambara J.Sun Certified Enterprise Architect for J2EE Study Guide[M].McGraw-Hill/Osborne,2003.
  • 10Ambler S W.Mapping Objects to Relational Databases[Z].O/R Mapping In Detail,http://www.isys.uni-klu.ac.at/ISYS/Courses/03SS/ eva/vounterlagen/5-XAmbler2000,2002-07.

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部