首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 57 毫秒
1.
基于Java卡的校园一卡通应用系统对于学校的现代化管理工作具有十分重要的作用.文中介绍了Java卡及校园一卡通应用系统,并从多个角度探讨校园一卡通应用系统的安全机制,提出了一套较为完整的安全方案.该方案分层、分类地对系统进行了保护.既保护了应用系统的本身安全,保证系统的正常运行,又保证了系统中重要数据与信息的安全.为应用系统安全性分析与防护提供了范例.  相似文献   

2.
校园一卡通系统体现了学校信息化建设水平,是数字化校园建设的一个重要应用系统,实现了一卡在手,走遍校园。而在系统中承载信息的载体Mifare One卡片的安全设计与安全管理在一卡通系统安全中最基础、最重要。  相似文献   

3.
校园一卡通系统体现了学校信息化建设水平,是数字化校园建设的一个重要应用系统,实现了"一卡在手,走遍校园"。而在系统中承载信息的载体MifareOne卡片的安全设计与安全管理在一卡通系统安全中最基础、最重要。  相似文献   

4.
校园一卡通系统对于学校的现代化管理工作具有十分重要的作用。文中介绍了校园一卡通应用系统的设计目标和组成,并从多个角度探讨校园一卡通应用系统的安全机制,提出了一套较为完整的系统网络安全策略。该策略分层、分类地对系统进行了保护。既保护了应用系统的本身安全,保证系统的正常运行,又保证了系统中重要数据与信息的安全。为应用系统安全性分析与防护提供了范例。  相似文献   

5.
陆松  梁俊斌  翁鸣  苏德富 《计算机应用》2004,24(Z1):233-235
介绍了Java卡的基本概念,列举了Java卡的优点,探讨了Java卡的开发流程.基于Java卡技术和J2EE架构设计开发了一个"校园一卡通"系统,给出了该系统的考勤子系统的详细设计.  相似文献   

6.
本文阐述了校园一卡通系统的总体方案设计:卡片及机具设计、校园一卡通系统的应用系统设计、校园一卡通系统的安全设计、校园一卡通系统的数据库设计.详细地描述了IC卡交费充值系统部分功能实现.  相似文献   

7.
数字校园建设以后,要求对应用数据进行整合。校园一卡通系统作为数字校园的重要组成部分,其数据来源于数字校园的相关应用系统,如何保持一卡通数据与相关应用系统数据的同步是系统建设要解决的重要问题。本文分析了一卡通数据采集模式,提出了基于SOA架构的共享数据中心来实现一卡通数据同步的方案,详细描述了数据同步的实现步骤,结果证明了该方案的有效性。  相似文献   

8.
以集美大学诚毅学院校园一卡通系统为例.介绍了一卡通系统的架构、技术成份、用卡模式以及系统的应用范围及情况。简述了校园一卡通工程在为学校提供的基础数据平台、金融平台.实现规范管理,在数字化校园建设中起到的重要作用。并对该系统的安全性进行分析.确保系统运行的稳定、安全。  相似文献   

9.
多功能IC卡系统设计与系统安全性   总被引:9,自引:0,他引:9  
西南交大校园卡’96系统、清华大学校园IC卡系统是国内高校有代表性的校园IC卡系统。此类多功能IC卡系统的设计,特别是系统的安全设计,对企事业单位的(单用途)IC卡支付系统和实现“一卡通”多功能应用系统的安全设计均有普遍参考价值。  相似文献   

10.
非接触IC卡读卡器的开发研究   总被引:7,自引:0,他引:7  
随着高校招生规模的不断扩大,各学校原有的消费和管理模式已不能适应新的发展要求,先进的校园一卡通系统的出现带来了管理工作的革命。论文介绍了校园一卡通的组成和应用,对非接触IC卡、串口通信、多线程等技术进行了研究,提出了使用多线程、串口等技术开发基于PC控制的非接触IC卡读卡器系统作为校园一卡通系统的一个重要子系统,建立非接触IC卡子系统模型,并给出了程序的测试结果。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号