Font Size: a A A

Research And Implementation On Vulnerability Database Examine And Approval Workflow System Based On JBPM And Lightweight J2EE

Posted on:2011-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y F XueFull Text:PDF
GTID:2178360308961215Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Approaches the season in the information age, various enterprises follow close on the time the footsteps, is transforming enterprise s business model, the management pattern, from traditional labor management system, to information automation management system transition. Meanwhile, enterprise's tradition-like administration of office pattern also in gradually releaved some setbacks, for example, there are poor coorparative capabilities between automation work systems; It could hardly adapt to the transformation of organization in traditional automation work systems, leading to be short of flexibility in regard to the change of the customer's business requirements, by means of hard-coded approach to the design of business processes. These methods were obviously not a good deal to meet the requirements of information technology. Therefore, how to eliminate the above drawbacks as much as possible would be an urgent problem needing to be addressed. Technology arose along with user needs.In recent years, workflow management system came into being with the organization and management services, and played an important part in the area of simplifying enterprise-class software development and maintenance costs, improving efficiency and customer service.This paper mainly studies the process management functions of "vulnerability database examine and approval workflow system", focusing on design and implementation the distinguishing feature of the client in the business process functions of countersigned received (including addition, subtraction sign, retroactive), vulnerability revoked, demote and re-publishing in terms of acceptance of vulnerability reporting. First, this paper described the workflow and workflow management system concepts, discussed and introduced a scheme of lightweight J2EE platform, Proposed the Solutions of vulnerability database examine and approval workflow system based on jBPM and lightweight J2EE framework. Secondly, studied the overall framework of vulnerability-based examine and approval workflow system putting forward the software architecture for jBPM integrated with the lightweight J2EE framework, gave a detailed description on the functionality of sending and receiving processes, vulnerability revocation, downgrade and re-design of publishing in the system for vulnerability database reporting approval; Finally, abstracted system model, based on demand analysis, implemented the reporting approval sytem for vulnerability database, sum up the whole issue of research and the implementation as well as future prospects.
Keywords/Search Tags:vulnerability database, workflow engine, jBPM, localization
PDF Full Text Request
Related items