Font Size: a A A

Design And Impletation Of Bussiness Website Backstage System

Posted on:2015-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:H JiangFull Text:PDF
GTID:2308330473951734Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, almost all over the world, people’s lives have been inseparable from the network. E-commerce has been and people are closely related. Since the 1990 s, the very rapid development of electronic commerce, affecting all aspects of society.Continued rise of e-business Web site, the site operators also put forward higher requirements, how to ensure that users of information security, how to prevent users from malicious deception, improve the user experience, and improve the performance of their systems.The system is to solve the following problems. First, the website information security-related issues, including security communication, monitoring user behavior and prevent the repudiation of his or her operations, and system privileges. Second, the problem of allowing users to safely login under the application of multi-platform situations. Third, the rapid statistics of commercial data problems. The system uses the Java as the background system programming language, and use the J2 EE framework as application architecture server system framework of the whole background, and uses very sophisticated Hibernate and Spring framework. At the database level using a stored procedure, master-slave and database index to optimize the database. In the web pages using ajax technology, making the frontstage and backstage asynchronous interaction which can enhance the user experience.The main research is work in the following areas. First, to design and implement a single sign-on, which can direct secure access to a system after successfully login in another system, including login validation, and generate cross-system verification and validation of the votes, and digital signatures to prevent users repudiation; second, design and implementation of statistical reports that commercial data and generate statistics excel file, which uses stored procedure technology; Finally, the design and implementation of the system of privileges, can intercept the illegal operation,in order to control the user’s security access, while the privileges related to business management modules.
Keywords/Search Tags:J2EE, login and verify, proceduret, privileges intercept
PDF Full Text Request
Related items