天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當前位置:主頁 > 管理論文 > 成本管理論文 >

保密工作信息系統(tǒng)的設計與實現(xiàn)

發(fā)布時間:2018-03-12 12:19

  本文選題:數(shù)據(jù)庫 切入點:可信網(wǎng)絡 出處:《吉林大學》2014年碩士論文 論文類型:學位論文


【摘要】:保密工作的管理長久以來一直依靠涉密人員通過人工方式進行記錄,大量的機要數(shù)據(jù)、審批單據(jù)、工作備忘只能通過紙質表格完成。近年來,隨著計算機的廣泛使用,保密工作中開始使用計算機進行編輯、記錄和存儲。但是,這樣的使用基本全為單機操作,只簡單地使用到了OFFICE、Visual FoxPro等辦公自動化和數(shù)據(jù)庫軟件,同時,出現(xiàn)了諸如“無法保障數(shù)據(jù)的安全性”、“難以實現(xiàn)用戶共同操作”、“雜亂無序的數(shù)據(jù)格式”、“與實際工作脫節(jié)”等問題,簡言之,沒有功能完備且專業(yè)的保密工作信息管理軟件已成為制約我國保密管理工作與時俱進的瓶頸。隨著國家在軍工科研領域投入的增大,參與軍工項目研制的科研人員數(shù)量激增,僅憑個體無法對海量的數(shù)據(jù)進行有效地采集、分析、匯總、檢索、交換和維護管理,以及與其他管理軟件的數(shù)據(jù)資源共享,并且人力成本增高、工作效率降低、數(shù)據(jù)錯誤不斷。 鑒于依靠涉密人員通過人工操作模式已經(jīng)無法滿足保密工作實際需要,研發(fā)一套功能完備且針對性強的保密工作信息管理軟件系統(tǒng)已迫在眉睫。本文正是基于這樣的實際需求,設計開發(fā)的一套B/S模式的保密工作信息系統(tǒng),,這套系統(tǒng)的成功開發(fā)和應用,必將會大大節(jié)省涉密科研單位在保密工作方面的人員成本、耗材成本、管理成本,從而進一步促使保密工作在管理上更加協(xié)同有效、規(guī)范合理、提高效率、節(jié)約成本。在本系統(tǒng)設計開發(fā)伊始,考慮到作為單位內部的保密工作信息系統(tǒng),投入運行后,必將會對大量的數(shù)據(jù)信息進行存儲,一旦發(fā)生信息泄露或者遭到網(wǎng)絡攻擊,將會給整個單位帶來難以估量的損失,所以保證其安全有效的運行是這套系統(tǒng)實現(xiàn)的基礎和前提所在。可信網(wǎng)絡連接中“策略庫”的思想正好是解決這一“安全性”的關鍵所在。基于此,本文中選擇加入了可信網(wǎng)絡連接中的“策略庫”思想以及采用基于“C3P0”的數(shù)據(jù)庫連接池。此外,為提高本系統(tǒng)的多用戶訪問的性能,確保該系統(tǒng)投入使用后,即使面對全單位涉密人員異常龐大日訪問量和并發(fā)數(shù)量,也能夠在高峰時段正常運行,設計時使用了一個高性能的數(shù)據(jù)庫連接池,解決系統(tǒng)高并發(fā)量的問題,因此,在本文系統(tǒng)中采用了基于“C3P0”的數(shù)據(jù)庫連接池。 本文,同時也以“保密工作信息系統(tǒng)”在本單位上線運行一段時間的實際狀況為例,證明了可信網(wǎng)絡連接在Web應用系統(tǒng)上的擴展應用是完全可行的觀點。
[Abstract]:The management of confidential work has long relied on secret personnel to record by manual means, large amounts of confidential data, examination and approval of documents, work memos can only be completed through paper forms. In recent years, with the widespread use of computers, In security work, computers are used for editing, recording and storing. However, this kind of use is basically a stand-alone operation, and it is only simple to use office automation and database software, such as OFFICEN visual FoxPro, and at the same time, Problems such as "inability to secure data", "difficult to achieve common user operations", "messy data formats", "out of touch with actual work", etc., in short, The lack of functional and professional information management software for confidential work has become a bottleneck restricting the development of security management in China. With the increase of national investment in the field of military research and development, the number of researchers participating in the development of military industrial projects has increased dramatically. Individuals alone cannot effectively collect, analyze, aggregate, retrieve, exchange and maintain data resources, and share data resources with other management software, and human costs increase, work efficiency decreases, and data errors continue. In view of the fact that it is no longer possible to meet the actual needs of confidential work by relying on confidential personnel through the manual operation mode, It is urgent to develop a fully functional and targeted information management system for confidential work. Based on this practical requirement, this paper designs and develops a set of confidential work information system based on B / S model. The successful development and application of this system will greatly save the personnel cost, material consumption cost and management cost of the secret scientific research units in the field of security work, thus further promoting the confidentiality work to be more coordinated and effective in management, and standardized and reasonable. At the beginning of the design and development of this system, considering the secret work information system within the unit, after it is put into operation, a large amount of data information will be stored. Once information is leaked or attacked by a network, it will bring incalculable losses to the entire unit. Therefore, ensuring its safe and effective operation is the foundation and premise of the system implementation. The idea of "policy library" in trusted network connection is the key to solve this "security". In this paper, the idea of "policy library" in trusted network connection is added, and the database connection pool based on "C3P0" is adopted. In addition, in order to improve the performance of multi-user access of the system and ensure that the system is put into use, Even in the face of the extremely large daily visits and concurrency of the whole unit, they can run normally during the peak hours. A high performance database connection pool is used in the design to solve the problem of high concurrency of the system. The database connection pool based on C 3 P 0 is used in this system. At the same time, taking the "secret work information system" as an example, it is proved that the extended application of trusted network connection in Web application system is completely feasible.
【學位授予單位】:吉林大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP311.52;TP309

【參考文獻】

相關期刊論文 前10條

1 史沖;張林科;雷朝峰;;淺談數(shù)據(jù)庫設計與建設[J];中國城市經(jīng)濟;2010年05期

2 葉升路;徐波;欒國森;;提高Web應用程序的安全性[J];計算機安全;2010年06期

3 胡仕強;;Web Services技術的應用安全研究[J];計算機安全;2010年10期

4 劉佐菁;;基于J2EE的軟件開發(fā)及其架構研究[J];廣東科技;2009年04期

5 王曉鵬;基于B/S結構和ASP.NET技術的Web應用研究及實現(xiàn)[J];貴州工業(yè)大學學報(自然科學版);2005年04期

6 余以勝;;Web環(huán)境下對可信網(wǎng)絡連接的擴展研究[J];華東師范大學學報(自然科學版);2009年04期

7 賀鋒;;韶山灌區(qū)用水管理信息系統(tǒng)研究與應用[J];湖南水利水電;2011年04期

8 胡亮;賀瑞蓮;袁巍;初劍峰;;基于信任服務IBE體系的權限管理[J];吉林大學學報(理學版);2011年04期

9 魏立峰;丁滟;陳松政;何連躍;;基于認證可信度的用戶權限控制技術研究[J];計算機工程與科學;2011年09期

10 羅安安;林闖;王元卓;鄧法超;陳震;;可信網(wǎng)絡連接的安全量化分析與協(xié)議改進[J];計算機學報;2009年05期



本文編號:1601529

資料下載
論文發(fā)表

本文鏈接:http://www.sikaile.net/guanlilunwen/chengbenguanlilunwen/1601529.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶098a1***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com