期刊文献+

基于微服务架构的铁路企业年金信息系统研究与实现 被引量:4

Railway enterprise annuity information system based on micro service architecture
下载PDF
导出
摘要 针对单体架构的铁路企业年金信息系统存在升级迭代复杂、可复用性和可维护性差等问题,在充分分析铁路企业年金管理实际需求和业务特点的基础之上,提出构建基于微服务架构的铁路企业年金信息系统,采用领域驱动设计理念对系统进行微服务拆分,设计系统的总体技术架构,详细阐述微服务架构、前端应用、认证授权、数据存储等关键技术的实现。该系统已上线并稳定运行,关键技术得到了验证。 Aiming at the problems of complex upgrade iteration, poor reusability and maintainability of railway enterprise annuity information system based on monolithic architecture, on the basis of fully analyzing the actual needs and business characteristics of railway enterprise annuity management, this paper put forward the construction of railway enterprise annuity information system based on micro-service architecture, adopted domain-driven design concept to split the system into micro-services and design the overall technical framework of the system. The paper elaborated on the implementation of key technologies such as micro-service architecture, front-end applications, authentication and authorization, data storage and so on. The system has been on line and operated stably, the key technologies were verified.
作者 王敬林 朱韦桥 WANG Jinglin;ZHU Weiqiao(Postgraduate Department, China Academy of Railway Sciences, Beijing 100081, China;Beijing Jingwei Information Technologies Co. Ltd., Beijing 100081, China;Institute of Computing Technologies, China Academy of Railway Sciences Corporation Limited,Beijing 100081, China)
出处 《铁路计算机应用》 2019年第5期22-26,30,共6页 Railway Computer Application
基金 中国铁路总公司科技研究开发计划课题(J2018S001 18CR086)
关键词 微服务架构 铁路企业 企业年金 micro service architecture railway enterprise enterprise annuity
  • 相关文献

参考文献6

二级参考文献38

  • 1陈皓.由12306.cn谈谈网站性能技术[EB/OL].http://coolshell.cn/articles/6470.htm1.
  • 2幽云十八.透过12306五大焦点看高性能高并发系统[EB/OL].http://storage.itl68.com/a2012/0217/1313/000001313424.shtml.
  • 3Hardt D.The OAuth2.0 authorization framework[EB/OL].[2013-02-01].http://tools.ietf.org/html/draft-ietf-oauth-v2-31.
  • 4Yan Haixing,Fang Huixing,Kuka C,et al.Verification for OAuth using ASLan++[C]//IEEE 16th International Symposium on High Assurance Systems Engineering,2015:76-84.
  • 5Pai S,Sharma Y,Kumar S,et al.Formal verification of OAuth2.0using Alloy framework[C]//International Conference on Communication Systems and Network Technologies,2011:655-659.
  • 6Bansal C,Bhargavan K,Maffeis S.Discovering concrete attacks on website authorization by formal analysis[C]//25th Computer Security Foundations Symposium,2012:247-262.
  • 7Cas Cremes.The scyther tool[EB/OL].[2015-08-31].http://www.cs.ox.ac.uk/people/cas.cremers/scyther/.
  • 8Li Jianai.Formal analysis and verification of network security protocols[M].Beijing:Machinery Industry Press,2010:1-70.
  • 9Patel H,Jinwala DC.Modeling and analysis of internet key exchange protocol v2and a proposal for its variant[C]//Proceedings of the 6th ACM India Computing Convention,2013:15-24.
  • 10Basin D,Cremers C,Meier S.Provably repairing the ISO/IEC9798standard for entity authentication[J].Journal of Computer Security,2013,21(6):817-846.

共引文献227

同被引文献19

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部