Font Size: a A A

Design And Implementation Of Workflow Business Rules And Security Constraints

Posted on:2012-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:M QinFull Text:PDF
GTID:2218330368497788Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Workflow in the enterprise management and enterprise information technology is a very important way, and is widely applied to all aspects of society. In the current, has developed a lot of work flow software, but these systems are for a specific enterprise or part of the business development, software is very simple, and not easy to extend, and the software security features are not appropriate, so performance of these software security and software reusability weak. The so-called workflow engine is specifically user-controlled workflow methodology and tools, it can be controlled and customized workflow, but in terms of general considerations of safety less.Out of the above consideration of the issue, this paper in the current popular Shark workflow engine, based on the engine development and expansion of the security and business process constraints, which will extend the prototype for the workflow system, the user can system customized according to the work-related business needs, and then formed a working process, add the appropriate security constraints, by means of Shark engines, it can be used in Web environment.The focus of this paper is how to achieve parity in the system business rules and system security constraint mechanism, and then to the Shark engine, added a library development activities, the role of library users, such as database tables and user library project, and the system business processes and the role of custom maps work life separate from the system, which adds its own way through the system's business rules and security constraints specification.This system can greatly reduce the current workflow design and development is more difficult, more flexible workflow, the most important is to increase the system's security constraints, to make up for the deficiencies of the original system.
Keywords/Search Tags:workflow engine, business rules, security, wokflow flexibility
PDF Full Text Request
Related items