期刊文献+

基于钉钉的移动办公微应用的设计与实现 被引量:19

Design and Implementation of Mobile Office Micro Application Based on Dingtalk.com
下载PDF
导出
摘要 研究了移动办公微应用的设计与实现过程,该系统是在阿里钉钉平台下,采用钉钉基础IM能力+开放平台+THINKPHP框架+MYSQL进行开发,同时兼容ios、andriod等多种移动系统的应用。该设计是一个专注于办公应用的平台,实现了企业日常工作中的请假,出差,报销,签到,会议预约,同时还有工作计划等创新功能,充分兼顾了办公应用的特有属性,又体现了企业对员工管理的特点。是一个基于企业通讯录的协作沟通平台,能够实现1-1,N-N的沟通与协作,信息的及时传递和及时送达,适用于企业与员工之间的管理与沟通,是一个行走的办公微应用。 This paper slxidies the design and implementation process of the micro mobile office applications, the system is based on Dingtalk.com platform, use the basic IM capability ofDingtalk.com + open platform + THINKPHP framework +MYSQL to develop,it compatible w ith IOS, Andriod and other mobile systems. The design is a plat- form focused on office applications, realizes the enterprise daily work leave, travel reimbursement, attendance, ap-pointment scheduling, and work plan and other innovative features, taking into account the unique attributes of of-fice applications, reflects the enterprise employee management features. A cooperative communication platform based on enterprise address book, to achieve 1-1, N-N communication and collaboration, timely delivery of info r-mation and timely delivery. Is suitable for the management and the communication between the enterprise and the staff, is a moving office micro application.
作者 许燕 XU Yan(Department of Information Engineering, Guangdong Polytechnic, Foshan Guangdong 528000, Chin)
出处 《软件》 2017年第4期137-141,共5页 Software
关键词 移动办公 微应用 钉钉 THINKPHP框架 API Mobile office Micro application Dingtalk. com THINKPHP framework API
  • 相关文献

参考文献7

二级参考文献37

  • 1沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,2007,27(1):114-117. 被引量:16
  • 2Primeton BPS6.0开发教程[OL].2008,http://www.primeton.com/support/hardbooks/.
  • 3欧阳春娟,李斌,李霞.基于蛙跳优化的安全LSB匹配隐写算法[J].新型工业化,2012,2(1):32-38.
  • 4贾凡.企业管理软件基于移动设备终端的用户体验设计[D].上海:华东理工大学,2011.25-32.
  • 5(美)诺曼.设计心理学[M].梅琼译.北京:中信出版社,2010.
  • 6Gusmeroli S, Piccione S, Rotondi D. A capability-based security approach to manage access control in the Internet of Things [ J ]. Mathematical and Computer Modelling, 2013,58 (5-6) : 1189-1205.
  • 7Pham Q, Reid J, McCullagh A, et al. On a taxonomy of delegation [ J ]. Computers and Security, 2010,29 ( 5 ) : 565-579.
  • 8RFC 6749, The OAuth 2.0 Authorization Framework[ S].
  • 9RFC 6750, The OAuth 2. 0 Authorization Framework: Bearer Token Usage[ S ].
  • 10RFC 6819, OAuth 2.0 Threat Model and Security Consid- erations [ S ].

共引文献72

同被引文献94

引证文献19

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部