Font Size: a A A

Research On SET Authentication Software Architecture And Multiple-Level Optimize Methods

Posted on:2007-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:M W YinFull Text:PDF
GTID:2178360185959881Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Based on Certification and Authentication software development for Integration of Electronic Commerce ,with guidance from the multiple methodologies of Object-Oriented Programming,Aspect-Oriented Programming and Component-Oriented Programming together, this paper discussed the security resolution in SET authentication from multiple point with J2EE framework and Spring framework ,then, multiple-level optimizations were operated on its software architecture.First , comparation was made for Spring framework against J2EE framework, furthermore,several principles and advice were proposed with analysis of OOP and AOP. Second ,emphases were put on SET authentication research, an architecture of SET authentication was proposed to expound the Intelligent Architecture Design Theory fitting with layered model .Then ,with displaying the protocol model , the process control principle was analysed , and more attention was taken to discuss the mathematic model of RSA algorithm and integration of various model methods , to give the component model based on Main-Program / Sub-Process architecture family and formalized description .Next ,by establishing the UserCase model,Activity model,Object Structure model and Sequence model in order,and based on the data model,a lot of measure were taken to optimize these models.Finally , the main framework of SET authentication in ACME template was given,with the Java implement and AOP implement for typical applications together .The conclusions ,modeling principles and process models that coming up from the paper were used in project research and implement well,to restrict the software development process and promote its efficiency.The architecture analyse process and method have generally theoretical meaning and engineering practicing value .
Keywords/Search Tags:SET authentication, software architecture, Spring framework, optimize method, Aspect Oriented Programming, protocol model, RSA algorithm, ACME template
PDF Full Text Request
Related items