(3.232.129.123) 您好!臺灣時間:2021/02/26 21:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:汪育慶
論文名稱:電子文件管理系統的理論與應用
論文名稱(外文):Theorem and application of electronic document management system
指導教授:葉爾良葉爾良引用關係
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:1999
畢業學年度:87
語文別:英文
論文頁數:83
中文關鍵詞:電子文件文件管理系統電子商務壓縮加密套表列印存取控管檔案索引
外文關鍵詞:R/S6000DB2ADSMElectronic document management systemRSA public keyElGamal public keyBlock ciphercompression
相關次數:
  • 被引用被引用:1
  • 點閱點閱:187
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:2
進入電子化文件的時代,傳統大量的紙張文件在製作,管理與儲存形成企業與政府機關最大的成本浪費,企業除了導入ERP (Enterprise Resource Planning)的觀念來使企業組織最佳化以外,必須在工作流程系統上搭配文件管理系統,以應付每日無以數計的文件報表,因此,電子文件管理系統成為現今企業資訊的重要課題之一,本文針對部份電子文件管理系統的基礎理論架構與應用的技術加以探討‧
目前為止,大多數的金融機構與政府單位的資料,均使用大型主機系統來處理,其優點為穩定性高、速度快,但缺點為價格昂貴、圖形與應用程式支援較少,且大型主機使用與一般個人電腦不同的通訊協定(如:SNA)與文字碼(如:EBCDIC),一般使用者不易使用。然而近年來由於價格低廉的個人用電腦在速度上逐漸跟上大型主機,一部份原來由大型主機負擔的工作,可以轉移至個人電腦上來執行,以多層次的處理架構來彌補大型主機環境的缺點。因此在本文中,我們嘗試針對銀行實際上的需求,設計一套架構在NT上的信用卡文件管理系統,在信用卡部門文件處理流程中的紙張文件,均可利用此一系統加以控管與儲存。除了使用加密與壓縮技術來達到安全性與網路傳輸的速度外,並根據各單位使用者的職權與工作內容,將各種不同之系統功能分級,以期達到更好的安全控管效果。
Traditional paper work is the largest waste of enterprises or government. For the sake of processing unnumbered documents everyday, enterprises need to integrate electronic document management system with workflow system, besides setting up Enterprise Resources Planning in Enterprise. Thus electronic document management system becomes one of the most important issues all over the world. In this thesis we will discuss the infrastructure theorem and implementation technologies of electronic document management system.
Until now, most financial institutions and government use mainframe system to process their data and document. Mainframe has the advantage of stable and faster than other machine. But it’s too expensive, hard to maintain and few GUI support. And sometimes mainframe environment use SNA as protocols different from general personal computers (TCPIP). It’s not convenient for general users. However, personal computers become cheaper and cheaper. In other hand, the performance of personal computer becomes better and betters. Thus some processes were moved from mainframe to personal computers in order to reduce loading of mainframe. In this thesis, we try to design a system on NT server and it can fit the requirement of banks. Besides user ID and password, we define different levels of accessing permission according to users duties. We hope this can makes the system security better.
Chapter 1 Introduction
1.1 Motivation
1.2 Background
1.2.1 The rise of Electronic Commerce
(a) Definition of E-commerce
(b) Two different types of E-commerce
(c) Impact of Electronic Commerce
1.2.2 Tendency in the future
1.3 Guide to the thesis
Chapter 2 Infrastructure of Electronic Document Management System
2.1 Mainframe environment nowadays
2.1.1 RS/6000
2.1.2 DB2
2.1.3 ADSM
2.2 EDMS methodology
2.2.1 Four element of EDMS
(a) Documents
(b) People
(c) Processes
(d) Technology
2.2.2 Necessary technologies of EMDS
(a) Creation and Conversion
(b) Repository and indexing
(c) Searching and online viewing
(d) Workflow and routing
(e) Data management and security
Chapter 3 Important Technology of Document Management
3.1 Encryption
3.1.1 RSA public key
(a) Concept and characteristic of RSA
(b) Theory of RSA
(c) Analysis of security
3.1.2 ElGamal public key
(a) Introduction
(b) Algorithm
(c) Analysis of security
3.1.3 The block cipher
(a) Concept of block ciphers
(b) The structures of block ciphers
(c) Adopted operations of block ciphers
3.2 Compression
3.2.1 Text
3.2.2 Image
(a) Introduction of JPEG
(b) Format of JPEG
(c) Theorem of JPEG
3.2.3 Audio
(a) Introduction of MPEG
(b) Architecture of MPEG
3.2.4 Portable document format
Chapter 4 The Implementation of Electronic Document Management System
4.1 Requirement of banks
4.1.1 Workflow of credit card department
4.1.2 Documents of credit card
4.1.3 Related users and department
4.2 Architecture of implementation
4.2.1 Library server
4.2.2 Object server
4.2.3 Administrator client
4.2.4 User client
4.2.5 Statistics subsystem
4.2.6 Form printing subsystem
4.2.7 Database and encryption subsystem
4.3 Functions and result
4.3.1 Security
4.3.2 Data preprocess and indexing
4.3.3 Document file importing
4.3.4 Annotation
4.3.5 Form printing
Chapter 5 Conclusion and future work
5.1 Conclusion
5.2 Future work
Reference
[1] Larry Bielawski & Jim Boyle, Electronic Document Management System, Prentice Hall PTR, Upper Saddle River, 1997.
[2] SMALL BUSINESS TECHNOLOGY - Getting Control Of The Paper - Document-management software can help small firms use information effectively, Nation''s Business v.86 n.11 pp.30-32.
[3] Wen, H Joseph ; Yen, David C ; Lin, Binshan, "Intranet document management systems", Internet Research - Electronic Networking Applications and Policy v.8 n.4 pp.338-346.
[4] Balasubramanian, V ; Bashian, Alf, "Document Management and Web Technologies: Alice Marries the Mad Hatter", Communications of the ACM - Association for Computing Machinery - CACM - Incl ACMemberNet v.41 n.7 pp.107-111.
[5] Ageenko, Eugene I ; Franti, Pasi, "Enhanced JBIG-based compression for satisfying objectives of engineering document management system", Optical Engineering - Bellingham v.37 n.5 pp.1530-1538.
[6] Smith, Chris, " Rover reaps the benefits of EDM - Getting the maximum benefit out of a document management system is only possible if it is properly integrated with wider business processes", IEE Review v.45 n.2 pp.73-76.
[7] Kroeker, Kirk L, "The Resource Directory: Image Documentorum: Imaging and Document Management Information Resources", EMedia Professional v.10 n.3 pp. 111.
[8] McGeachin, Robert B, "ARTICLES - The Feasibility of Using Document Management Software in the Scholar''s Workstation", Journal of Academic Librarianship v.24 n.6 pp.449-454.
[9] Wilson, Jackie , "Electronic Document Management", Computer Law and Security Report v.13 n.2 pp. 124-125.
[10] Losee, Robert M, "Browsing document collections: Automatically organizing digital libraries and hypermedia using the Gray code", Information Processing and Management v.33 n.2 pp. 175-192.
[11] Zobel, Justin, "Document Processing and Retrieval", Information Processing and Management v.33 n.3 pp. 405.
[12] Madigan, C ; Silber, M K ; Wilson, S, "Lessons learned prototyping an SGML-based computerized document management system", IEEE Transactions on Professional Communications v.40 n.2 pp. 139-143.
[13] Wiggins, Bob ; Bawden, David, "Integrated Document Management, Document-Oriented Systems for Business Benefit", International Journal of Information Management v.17 n.5
[14] Harris, S B ; Owen, J ; Bloor, M S ; Hogg, I, "Engineering document management strategy", Proceedings of the Institution of MechanicalEngineers -B- Jnl of Engineering Manufacture v.211 n.5 pp. 385-406.
[15] O''Kane, Kevin C, "Generating Hierarchical Document Indices from Common Denominators in Large Document Collections", Information Processing and Management v.32 n.1 pp. 105-116.
[16] Bianchi, Nadia ; Mussio, Piero ; Padula, Marco ; Rubbia Rinaldi, Giuliana, " Multimedia document management: An anthropocentric approach", Information Processing and Management v.32 n.3 pp. 287-304.
[17] Lucarini, Dan, "In Pursuit of a Paperless Small Business Office: Document Imaging Management and CD-R", CD-ROM Professional v.9 n.4 pp. 58-65.
[18] Rein, Gail L ; McCue, Daniel L ; Slein, Judith A, "A Case for Document Management Functions on the Web", Communications of the ACM - Association for Computing Machinery - CACM - Incl ACMemberNet v.40 n.9 pp. 81-89.
[19] B.schnerier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption Cambridge Security Workshop Proceedings, Springer-Verlag, ,pp.191-294. 1994.
[20] B.schnerier, Applied Cryptography, 2nd edition, John wiley & Sons, Inc 1996.
[21] B.S. Kaliski and M.J.B. Robshaw, “Fast Block Cipher Proposal,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, pp.33-40. 1994
[22] X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing, v.1, Konstanz: Hartung-Gorre Verlag, 1992.
[23] J. Daemen, R. Govaerts and J. Vandewalle, “Blodk Ciphers Based on Modular Arithmetic,” Proceedings of the 3rd Symposium on State and progress of Research in Cryptography, Rome, Italy, 15-16, pp.80-89. Feb 1993.
[24] J. Daemen, R. Govaerts and J. Vandewalle, “A New Approach to Block to Cipher Design,” Fast Software Encryption , Cambridge Security Workshop Proceedings, Springer-Verlag, pp.18-32. 1994.
[25] J.L. Massey, “SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm,” Fast Software Encryption , Cambridge Security Workshop Proceedings, Springer-Verlag, pp.1-17, 1994.
[26] H. Feistel, Block Cipher Cryptographic System, U.S. Patent #3,798,359, 19 Mar 1974.
[27] R. Rivest, A. Shamir and L. Adleman, ”A Method for Obtaining Degital Signatures and Public-Key Cryptosystems,” Communications of the ACM.Vol 21, no.2, pp120-126, Feb 1978.
[28] J. Gordon, “Strong RSA Key,” Electronics Letters, Vol.20; pp514-516, 1984.
[29] T. ElGamal, A public key cryptosystem and a signature scheme based on the discrete logarithm, IEEE Trans. On Information Theory 31(4). pp. 469-472, 1985.
[30] L. Chiariglione, “Impact of MPEG standard on Multimedia Industry”, Proceedings of the IEEE, 86(6), pp.1222-1227, Jun. 1998.
[31] Li-Wei Wang, “Introduction to AC-3 and MPEG-2 Multi-channel Audio Compression”, 電腦與通訊, 第58期, 頁19-26. April 1997.
[32] J. Boyle “A Blueprint for Managing Documents”, Byte 22(5), pp. 75-80, May. 1997
[33] Po-Wen Lu. An Implementation of a Electronic Document Database Workflow Model. A Thesis of NTIT, Juan 1996
[34] You-Wei shen. Design of A Campus Document Processing System. A thesis submitted to CSIE of NVU, June 1997.
[35] Hsun-Chang Hsieh, “The Application and Development of Speech Coding”, 電腦與通訊, 第49期, pp.3-10. May 1996.
[36] A. Rosenfeld and A. C. Kak, “Digital Picture Processing,” Vol. 2, Academic Press, New York, pp.241-242. 1982.
[37] F. M. Wahl, K. Y. Wong, et al, “Block Segmentation and Text Extraction in Mixed Text/Image Document,” 5-390. December 1982.
[38] Rafael C. Gonzalez & Richard E. Woods, Digital Image Processing, Addison-Wesley Publishing Company, 1992.
[39] Ravi Kalakota & Andrew B. Whinston, Frontiers of Electronic Commerce, Addison-Wesley Publishing Company, 1996.
[40] D''Alleyrand, Marc, "Workflow in Imaging System:, Association for Information and Image Management, 1992
[41] Jim I. Jones, Kenneth R. Morrison, "Workflow and Electronic Document Management", Computers and Industrial Engineering, Vol. 25, No 1-4, pp.527-531, 1993.
[42] Tim Mortimer, Dale McCurdy, Malkit Hayun, Frank Sarstedt, Georg Ember, Cyndie Behrens, Using ADSM to Back Up Databases, International Technical Support Organization, http://www.redbooks.ibm.com
[43] 汪育慶, “RSA Public Key 的加密原理”, PC World/ WINDOWS World, pp.90-91 Sep. 1997,
[44] Robert Sedgewick, Algorithm in C, Addison-Wesley Publishing Company, pp.338-341, December, 1990. 姚明華, “區域基礎階層式文件資訊系統”, 國立交通大學碩士論文, 民國七十八年.
[45] 周忠信, “資料壓縮”, 人力發展月刊, 第三十八期, 頁50-56, 民國八十六年三月
[46] 趙象華, “不再為文件管理傷神-淺談文件管理系統”, 資訊與電腦, 頁66-68. 1996 11月號.
[47] 李元泰, “Windows 字型, 圖形檔案格式深入解析”, 儒林圖書有限公司, 民國八十五年三月初版.
[48] 段迅雷, "文件管理自動化系統之研製", 國立中央大學博士論文, 民國七十六年.
[49] 王士榮, "比較分析 GIF、TIFF、JPEG、EPS 檔案格式壓縮狀況", 印刷學報3期, 頁52, 1997.
[50] 王銓祺 “On the studies of Block Ciphers and NNR Ciphers”,國立交通大學博士論文,民國八十七年十月
[51] 樊國禎, 莊慶郎, 王信發, “公開金鑰密碼技術簡述”, 電腦與通訊, 第65期, , pp 3-19. 1997
[52] 樊國禎等, 電子商務安全簡介, CCL Technical Journal電腦與通訊, 第55期, 頁34-53, 民國85年12月.
[53] 樊國禎, 電子商務高階安全防護-公開金鑰密碼資訊系統安全原理, 資訊與電腦出版社, 民國86年9月.
[54] 曾永國, 應用RSA密碼法於辦公室文件處理, 國立交通大學碩士論文, 民國八十二年.
[55] 劉震昌, “MPEG Layer I, II 架構下之立體音訊壓縮探討”, 國立交通大學碩士論文, 民國八十五年.
[56] 徐建華, “MPEG第二級音訊編碼系統之壓縮, 優化及品質評估研究”, 國立交通大學碩論文, 民國八十六年.
[57] 黃弘毅, "公文表格管理及工作流程處理" , 國立交通大學碩論文, 民國八十五年.
[58] 伍淑慧, "工作流程管理系統與群組軟體應用在國內資訊業之現況與效率研究", 國立交通大學碩士論文, 民國八十六年.
[59] 盧博文, "一個以電子文件資料庫為基底的工作流程模式製作", 國立台灣科技大學碩士論文, 民國八十五年.
[60] 蕭嘉興, "文件資料庫擷取方法之研究", 國立交通大學碩士論文, 民國八十一年.
[61] 張均量, "空白表格影像的自動辨識與瞭解", 國立交通大學碩士論文, 民國八十七年.
[62] 李宴昌, "HDMS--視窗環境下之超媒體文件管理系統", 國立交通大學碩士論文, 民國八十三年.
[63] 何姿欣, "隨機選取的密碼方法", 國立交通大學碩士論文, 民國八十五年.
[64] 楊文和, "開放式網路上之身份確認與金匙交換協定", 國立交通大學碩士論文, 民國八十四年.
[65] 連建欽, "一個以SGML/HyTime為基礎的多媒體文件管理系統", 私立元智大學碩士論文, 民國八十五年.
[66] 欒斌, 孫衙聰, “國內電子型錄購物之現況及未來發展之架構”, http://ecrg.ba.ntust.edu.tw/test.html
[67] Akhilesh Tuteja, “Enterprise Resource Planning: What’s There in It!," http://www.geocities.com/CollegePark/Library/6045/erp.html
[68] 陳敏, “電子商務的現況與未來”, http://www.nchc.goc.tw/NCHC/Journal/Other/V5N2/p31-p33.html
[69] 林大偉, “二十一世紀企業新希望-電子商務”, http://www.ntifo.org.tw/info/old/info11-1.htm
[70] Kervin Sean, "Apaper on Workflow system CIS 811 - Introduction to Information Infrastructure," http://www.mindspring.com/~smkervin/wftitl.html, 1995.
[71] Workflow system, http://cne.gmu.edu/modules/workflow.workflow-systems.htm
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔