Font Size: a A A

Design And Realization Of The Sercurity Information System Of One Army Unit

Posted on:2014-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:W DengFull Text:PDF
GTID:2248330395974482Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and the increasinginformation dissemination channels, the content of military confidential work in thenew era is enriched and the extension is further increased, facing an unprecedented newsituation and new challenges. How to adapt to complicated new situations, to betterserve the main work, to do a good confidential job, is what all of us need to think andexplore. Information security and confidentiality is a long-term, historical tasks.Nowadays, with continuous development of science, the secure and confidential workhas become a top priority in the Army.This paper introduces a military secure and confidential system. In this paper, weanalyses the current status of military confidential systems and the usability in currentenvironment, and present a Web-based solution to military confidential system.Adopting Python-based Django framework and Django’s MVC design pattern, we makethe programming of complex, database-driven Web site easier. In addition, we focus onthe reuse and "plug ability" of components, agile development and DRY principles(Don’t Repeat Yourself). Open-source database MySQL is used in the background.In this paper, we first introduces the basic concepts of confidential systems andtheir characteristics, and clarify the importance of using the military confidentialsystems. Then we focuses on the system design and implementation. In the part ofsystem design, we begin with military confidential process, system objective and systemanalysis, and then we propose the overall design scheme and make a detaileddescription of the function design and implementation of the subsystem of secret-relatedcomputer, secret-related information vehicle management, science and research projectmanagement and research group management. Finally the system test method isintroduced.
Keywords/Search Tags:Security System, MVC design pattern, Django, Python
PDF Full Text Request
Related items