Font Size: a A A

Design And Security Research Of Public Computer Lab

Posted on:2010-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:H Y SunFull Text:PDF
GTID:2178360302464223Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the increase of student enrollment and infotech (IT) based education, the scale of public computer lab in colleges/universities has been greatly enlarged. The traditional computer lab management system is out of date. Using IC card system to manage computer lab becomes a new trend. This new system will computerize lab management, greatly improve lab's utilization and provide excellent service for research and educational activities.In this paper, using the public computer lab management system at Lianyungang Teachers College as the research object, we create a UML model and do in-depth analysis and research on the system, and finally come up with a proposal of how to design and develop a system suitable to our college.In this paper, we discuss our proposal in following aspects.At first, this paper briefly introduces the different management systems and gives a quick analysis on the technologies employed by each system. After study of J2EE, we propose a three-tier framework based lab management system. With analyzing and comparing C/S mode and B/S mode, we also propose a mixed-mode of C/S and B/S in order to satisfy our needs.Secondly, we create a design model based on studying the existing computer lab management system at our college and analyzing the lab utilization under UML model. Further, we implement UML model in software, and design and develop the system as well.Finally, to ensure the security of our system, we have studied the potential security issues and come up with a comprehensive and practicable security design for our system. Our study covers terminal security, network information security, data security, application security and database encryption.The methods proposed in this paper have been applied to the public computer lab management system at Lianyungang Teachers College. Our method and conclusion have been verified by the system, which also proves our proposal is practicable and could be generally applied.
Keywords/Search Tags:C/S, B/S, UML computer lab management, Information security
PDF Full Text Request
Related items