Font Size: a A A

Research And Realization On Flexible Workflow In Vulnerability Database Report Management System

Posted on:2012-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:J J CaiFull Text:PDF
GTID:2178330335960002Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the promotion of new generation of information technology, information security has been one of the development emphases of information technology, and information processing technology has also been paid more and more attention. As a subproject of China National Vulnerability Database launched by National Computer Network Emergency Response Technical Team/Coordination Center of China, Vulnerability Database Report Management System belongs to the 242 National Issues and is a successful example of supporting Internet security with information processing technology. Its construction purpose is to do regular processing, verification and assessment to vulnerability information collected via various ways, and to release valid vulnerability and verification information to public. As an important part of the national maintenance to information security, we use the workflow model to regulate the information processing in the system, thus the research on the flexible workflow model helps effectively improve the flexibility and utility of the information processing process, and is of outstanding research value.On the basis of summarizing the functional requirements of Vulnerability Database Report Management System, the article focused on flexible terms from the requirement analysis of the system, deeply studied on workflow management systems, designed the flexible workflow model considering the requirements of dynamic process definition modification, countersign, participant adding, participant removing, automatic task assignment and automatic decision making of Vulnerability Database Report System, made flexible extension mainly from four aspects of dynamic process definition, dynamic process execution, automatic task assignment and automatic decision making, and satisfied the requirements of process definition dynamicalization, process execution dynamicalization, task assignment automatization and decision making regularization. It innovatively integrated the JBPM workflow engine with the Drools rule engine and implemented the system, thus increased information processing flexibility, effectively reduced the error of information processing result caused by dynamic process definition, improved the accuracy of China National Vulnerability Database, and enhanced the vulnerability collection and publication and the Internet security maintenance.
Keywords/Search Tags:flexibility, workflow, rule engine, vulnerability database, JBPM
PDF Full Text Request
Related items