期刊文献+

业务逻辑可重构的网络应用系统设计与实现 被引量:1

Business Logic Reconstruction Widely Suitable for Different Scenarios of Networking Applications
下载PDF
导出
摘要 提出了一种应用软件可重构和可配置的方法,并对此进行研究。由此开发出企业信息化软件开发平台——ICET IP系统。ICET IP系统可适应不同应用逻辑需求,真正实现业务逻辑可重构和系统功能可配置,而且维护升级非常方便。 Purpose. We designed and implemented what we call AppCore (application Core) technology, which can handle the data flow, form flow and event flow for any business logic and, based on our AppCore technology, we developed what we call ICETIP (Information-Centered Enterprise TransactionIntegrated Processing) system as a networking development platform. Using ICETIP we performed business logic reconstruction without any programming for an enterprise in Xinjiang province according to their networking application requirements; our reconstruction was so successful that they found no need to make any further change. Now a number of enterprises are asking for our help to perform business logic reconstruction according to their respective networking application requirements. In the full paper, we explain AppCore technology and ICETIP platform in detail; in this abstract we just list the two topics of our explanation: (1) essentials of the AppCore technology and ICETIP platform; (2) design and implementation of ICETIP platform; the subtopics are architecture of ICETIP platform, the processing procedure and communications among platform components, and the procedure of constructing networking applications based on business logic. Before performing reconstruction for the enterprise in Xinjiang province, we had tested our ICETIP platform in our laboratory and found that ICETIP platform worked well.
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2006年第3期371-374,共4页 Journal of Northwestern Polytechnical University
关键词 可重构 业务逻辑 ICETIP系统 reconstruction, business logic, ICETIP (Information-Centered Enterprise Transaction-Integrated Processing) platform
  • 相关文献

参考文献4

二级参考文献26

  • 1[3]OMG.MDA Guide version 1.0.1[EB/OL].http:∥www.omg.org,2004.
  • 2[4]龚报钧.基于Agent的开放信息集成体系结构[D].浙江大学博士学位论文,2002.
  • 3[7]SHOHAM Y.Agent-oriented Programming [ J ].Artificial Intelli gence,1993,60(1):51-92.
  • 4张屿 李彤.一种基于构件的软件可靠性计算方法.云南大学学报,2003,25(6):22-24.
  • 5Roger S Pressman. Software Engineering a Practitioner's Approach (Fifth Edition)[M]. McGraw, 2002. 721-746.
  • 6Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 7David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 8Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 9Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 10Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.

共引文献73

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部