Font Size: a A A

Design And Development Of Army Document Flow System Based On Workflow

Posted on:2017-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q XiaFull Text:PDF
GTID:2308330488975888Subject:Software engineering
Abstract/Summary:PDF Full Text Request
he application of computer technology and network technology in the military is more widely and more deeply. Analyzing the condition of military application of office automation technology, at present a lot of troops still remain the stage of working in the use of operating system resources management and office software, the efficiency of which is low.In view of the current military having not yet established an efficient system of office automation, the low office efficiency and the document security not being effectively safeguarded and so on, the paper constructed a set of document flow system that are regarded as the core support system of military office automation platform based on workflow technology, which solved the existence problem of the process of sending and receiving documents and reviewing and so on and improved the document transfer mechanism. In the process of specific design and realization,according to the existing document management inconvenience problem in the traditional using timely communication tool to achieve document transceiver mode, it introduced the workflow mechanism and constructed workflow management module,so that the file management has the trace to follow. In view of the traditional workflow platform flexibility being not high, not customizing according to the actual business needs, or modifying the existing problem of workflow, it designed and developed a workflow editor module, using the graphical approach to design and definite the workflow, and utilizing the XML document to preserve the workflow template. In view of the workflow platform difficultly saving the modifying traces for the examination and approval of document, it designed and developed the function of document modification trace retention to ensure the authenticity and reliability of document modification so that all operations on the document are editable through the program controlling. According to the relevant departments for the special requirements of army document security and confidentiality, in the design of document circulation system, it introduced PKI technology and constructed the CA Certification Center combining the workflow technology with the authentication technique, which can effectively improve safety and confidentiality of the document processing process and strictly controlled the scope of informing document content.This thesis firstly studies the background and significance of the construction ofdocument circulation system in the army, and then analyzes the research status at home and abroad in this field and the research status of network security authentication, and then uses the related theory knowledge in software engineering to do the demand analysis of the system functionality and performance. Based on the results of needs analysis, it designs the overall structure of the system from multiple angles and designs the main function module of the system in detail. To achieve the main function of the system by using the Java language, it discusses in detail the construction and implementation process of CA Certification Center Based on PKI.Finally, the test case verifies that the function and performance of the system has reached the design requirements.As the military require highly for document management, the design and development of this system can save a lot of time document searched, submitted and so on, and effectively improve the efficiency of management, further enhance the combat effectiveness of the armed forces, and has important application value. At the same time, the introduction of CA authentication technology in the document flow process, can effectively improve the security and secrecy of document and meets the special requirements of military.
Keywords/Search Tags:Document Flow, Workflow Reference Model, Certification Bodies, Public Key Infrastructure
PDF Full Text Request
Related items