Font Size: a A A

The Campus Office Automation System Based On Web Design And Implementation

Posted on:2013-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:W JingFull Text:PDF
GTID:2248330374486083Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Modern office automation system (Office Automation, referred to as OA) is theuse of computer technology to provide Web-based enterprise applications forlarge-scale collaborative work software, can greatly improve office efficiency andreduce business costs. This system is implemented based on B/S model office systemfeatures include: information dissemination, public resources, document management,personal office, integrated administrative, online exchanges.System uses three logical layer design model, namely, the presentation layer,business logic and data access layer. WEB application with the traditional, the systemasynchronous interaction through the application of AJAX to improve the userexperience, user interface and the server no longer directly interact, but in the userinterface and add an AJAX engine server, which will be responsible for handling theuser interface and the interaction with the server.System uses role-based access control RBAC (Role-Based Access Control)technology, through RBAC, permissions granted to the user no longer directly, butthrough the connection permissions and user roles, permissions granted to roles, by theuser, each user can belong to multiple roles, a role can contain multiple users, to achievethe efficient and flexible access control.In order to improve the maintainability of the system, simplify the UI (UserInterface, user interface) design, easy UI, dynamic organization, the system introduces acomplete database management, data-driven approach to the UI rendering. Through theUI information is stored in the database, the program can be achieved based on theactual situation (such as different users and different permissions) dynamic componentrelated to the interface.In order to achieve the security of the login process, the system presents a HMAC(Keyed-Hashing for Message Authentication Code) algorithm, hash algorithm byadding randomly generated key server, the client computing in a limited ability toeffectively avoid the log process is the secret of facing crack monitoring or replayattacks.
Keywords/Search Tags:Office Automation, B/S data, driving, AJAX
PDF Full Text Request
Related items