期刊文献+

基于反转控制的有态POJO管理模型 被引量:2

Management model of stateful POJO based on inversion of control
下载PDF
导出
摘要 目前会话信息的保存主要基于session进行直接管理,session机制基于无连接的HTTP协议实现了有连接服务,对保存客户端和服务器之间的会话状态有着重要的作用,但是session直接存储机制的固有缺陷将造成表现层的业务组件直接与session耦合,给系统单元测试带来困难,同时也不利于系统的会话建模。IoC(inversion of control)模式很好的解决了组件的耦合和测试问题,但是IoC管理的都是无态POJO(plain old Java object)。提出了一种基于IoC模式的有态POJO管理模型,将有态POJO的依赖关系和生命周期作为通用组件纳入模型的管理,并证明了有态POJO和无态POJO之间的引用完整性约束。通过对比可以看出,该模型有效地解决了传统session机制所存在的缺陷。 Connection-oriented service is implemented by session mechanism based on unconnected Http protocol. It is important to preserve conversation states between clients and servers. At present the preservation of conversation information is mainly managed by the session. But the intrinsic defects of directly session accessing would result in tight coupling between the session and the business com- ponents of the presentation layer, and the difficulty of system unit test, as well as causing troubles in system conversation modeling. The components coupling and the test issues are solved well by IoC (inversion of control) pattern, but the objects managed by IoC are stateless POJO (plain old Java object) s. A management model of stateful POJO based on IoC pattern is proposed, by which the dependencies and the lifecycle of stateful POJO is managed as a common component, and the constraint of referential integrity between stateful POJO and stateless POJO is also proved. The defects of the traditional session mechanism could be effectively solved with this model by comparison.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第9期1998-2000,2017,共4页 Computer Engineering and Design
基金 四川省计算机软件重点实验室基金项目(00060510)
关键词 无态POJO 有态POJO 耦合 反转控制 会话建模 stateless POJO stateful POJO coupling inversion of control conversation modeling
  • 相关文献

参考文献11

  • 1Martin Fowler.Inversion of control containers and the dependency injection pattem[EB/OL].http://www.martinfowler.com/articles/injection.html,2004.
  • 2Garrett Conaty.Beehive 中的IoC[EB/OL].http://dev2dev.bea.com.cn/techdoc/2005012103.html,2005-01-21.
  • 3Malarvannan M.Design better software with the inversion of control pattern[EB/OL].http://www.devx.com/Java/Ar2ticle/27583/0/page/1,2005-03-18.
  • 4Johnson R,Hoeller J.Expert one-on-one J2EE development without EJB[M].Indiana:Wiley Publishing Inc,2004.
  • 5阎宏.Java与模式[M].北京:电子工业出版社,2003..
  • 6郎云鹏.Session 详解[EB/OL].http://dev2dev.bea.com.cn/bbs/jishudata/ArticleShow.jsp? Id=10.
  • 7章炯民,王新伟,曹立.离散数学[M].第4版.北京:清华大学出版社,2005.57-147.
  • 8彭新光,马晓丽.会话属性优化的网络异常检测模型[J].计算机工程与设计,2005,26(11):2945-2948. 被引量:2
  • 9胡兆阳,谢余强,舒辉.ASP.NET中会话状态实现研究[J].计算机工程与设计,2005,26(12):3409-3412. 被引量:3
  • 10Ted Husted,Vincent Massol.JUnit in Action[M].USA:Manning Publications,2004.78-248.

二级参考文献10

  • 1Chappell David,侯捷,荣耀.Net大局观[M].武汉:华中科技大学,2003.
  • 2Bell Jason,Clark Mike,赵彦敏.ASP.NET程序员参考手册[M].北京:清华大学出版社,2002.
  • 3Microsoft MSDN Library(April 2000 edition)[EB/OL].2000.Microsoft Corporation,http://msdn.microsoft.com.
  • 4StephenWalther 马朝晖 译.ASP.NET技术内幕[M].北京:机械工业出版社,2002..
  • 5Juan M Est&ez-Tapiador, Pedro Garci a-Teodoro, Jesus E Di az-Verdejo. Measuring normality in HTTP traffic for anomaly-based intrusion detection[J].International Journal of Computer and Telecommunications Networking, 2004, 45(2): 175-193.
  • 6Wenke Lee, Sal Stolfo. A Framework for constructing feature and models for intrusion detection systems[J]. ACM Transactions on Information and System Security, 2000, 3(4): 227-261.
  • 7Matthew V Mahoney, Philip K Chan. An Analysis of the 1999 DARPA/lincoln laboratories evaluation data for network anomaly detection[C]. Berlin Germany: Springer, Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, 2003. 220-237.
  • 8Lee W, Fan W, Miller M, et al. Toward cost-sensitive modeling for intrusion detection and response[J]. Journal of Computer Security, 2002, 10(1): 5-22.
  • 9Richard Lippmann, Joshua W Haines, David J Fried, et al. The 1999 DARPA off-line intrusion detection evaluation[J]. The International Journal of Computer and Telecommunications Networking, 2000, 34(4): 579-595.
  • 10William W Cohen. Fast effective rule induction[C]. California USA: Proceedings of the Twelfth International Conference on Machine Learning, 1995.115-123.

共引文献11

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部