期刊文献+

电力企业后勤管理信息系统设计与实现 被引量:1

Design and implementation of logistics management information system for electric power
下载PDF
导出
摘要 因电力市场改革,电力企业需要提高自身服务水平,但现代电力服务需求背景下,常规服务方法难以处理规模庞大的服务信息,导致服务水平下降。为改善该现状,文章将结合C/S、C/S/S两种主流架构模式的对比,应用C/S/S作为基础框架展开系统基本设置,对分布式数据库、中间件及客户端等进行细化设计,建立了具有普遍适用性的原型后勤管理系统;同时,利用管理员控制权限获取、组件服务透明化、COM组件分布式布设等技术初始化系统设置,以实现系统的各项管理功能。 Due to the reform of power market, power enterprises need to improve their own service level, but under the background of modern power service demand, conventional service methods are difficult to deal with large-scale service information, resulting in a decline in service level. In order to improve this situation, this paper combined the comparison of C/S and C/S/S two mainstream architecture modes, and use C/S/S as the basic framework to deploy the basic settings of the system;to design the basic configuration of the system, distributed database, middleware and client in detail, and established a prototype logistics management system with universal applicability. At the same time, the system settings are initialized by using administrator control rights acquisition, component service transparency, COM component distributed deployment and other technologies to realize various management functions of the system.
作者 赵勇 Zhao Yong(State grid Jibei electric power company limited skills training center, Baoding, 071051,China)
出处 《现代科学仪器》 2018年第6期36-39,共4页 Modern Scientific Instruments
关键词 电力企业 C/S/S结构 COM组件 中间件 Electric Power Enterprise C/S/S Structure COM Component Middleware
  • 相关文献

参考文献6

二级参考文献49

  • 1王堃,于悦,张玉华,郭篁,王琳琳.面向物联网应用平台的Socket设计与优化[J].吉林大学学报(工学版),2012,42(S1):290-294. 被引量:19
  • 2许鸿文,许璐文.基于多层分布式结构技术管理信息系统[J].武汉工程职业技术学院学报,2003,15(2):39-41. 被引量:1
  • 3蔡长安,王盈瑛.C/S和B/S的模式的比较和选择[J].渭南师范学院学报,2006,21(2):47-50. 被引量:34
  • 4李敏.C/S和B/S模式及混合模式研究[J].西华师范大学学报(自然科学版),2006,27(2):198-201. 被引量:10
  • 5冯朝胜,秦志光,袁丁.数据库加密系统密钥管理模块的设计[J].电子科技大学学报,2007,36(5):830-833. 被引量:12
  • 6Shafiq B, Joshi J B D, Bertino E, et al. Secure interoperation in a multidomain environment employing RBAC policies [J]. IEEE Trans on Knowledge and Data Engineering, 2005, 17 (11) : 1557-1577.
  • 7Park J, Sandhu R. Towards usage control models: Beyond traditional access control [C] //Proe of ACM SACMAT'02. New York: ACM, 2002:57-64.
  • 8Joshi J B D, Bertino E, Latif U, et al. A generalized temporal role-based access control model [J]. IEEE Trans on Knowledge and Data Engineering, 2005, 17(1): 4-23.
  • 9Ray I, Kumar M, Yu L. LRBAC: A location-aware role based access control model [G] //LNCS 4332: Proc of the 2nd Int Conf on Information Systems Security. Berlin: Springer, 2006:147-161.
  • 10Chen H C, Wang S J, Wen J H, et al. Temporal and location-based RBAC model [C] //Proc of IEEE 2009 5th Int Joint Conf on INC, IMS and IDC. Los Alamitos, CA: IEEE Computer Society, 2009: 2111-2116.

共引文献34

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部