跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/07 18:44
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:趙怡斐
研究生(外文):Yi-Fei Jhao
論文名稱:應用網路服務技術整合陸軍大型系統
論文名稱(外文):Using Web Services Technology to Integrate Army''s Large-cale Systems
指導教授:劉俞志劉俞志引用關係
指導教授(外文):Yu-Chih Liu
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:46
中文關鍵詞:網路服務服務導向架構資訊安全
外文關鍵詞:Web ServicesService Oriented ArchitectureInformation Security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:351
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,陸軍各單位依業務特性,發展出各自獨立的系統,以符合使用者的作業需求,但卻造成系統之間資訊無法共用、分享,在國軍組織調整的政策下,各單位勢必要將不同系統的資訊及數據做有效的整合運用,加強各系統之間的聯繫和協調,以提昇組織作業成效。
為了能有效的運用現有人力,避免資源浪費,本研究對陸軍單位資訊整合的應用提出一個完整的架構,以網路服務(Web Services)的技術建立一個服務導向架構(Service Oriented Architecture),將原有系統間的流程重新規劃,以提高業務流程靈活性,加速開發效率,減少後續維護成本。另分析可能發生的安全問題,提出權限控管、訊息加密及過濾的方法來設計Web Services安全系統,確保資料傳輸的安全性,期使在完善的資訊安全架構下,逹到組織的快速變化需求的目標。
For the recent years, as in the army branch services and maintenance purpose, has developed an unique and independent system for achieving the operation the operation request from the end users. Thus, information can no be shared from different systems. For the Taiwan Nation Defense (Army) organization streamline strengthen, coordination and negotiated to improve organization operation affectivity.
Within efficient human resource implementation and avoid the waste of investment. This research was finding out a complete structure to the army information integrated implementation. Conducting the web services to create a service Oriented Architecture, as re-design the flow char between systems to improve operation scalability, develop efficiency, following maintenance cost reduce. And for the security issue, as authorized control, message encrypted and refine to design the security system of the web services, to ensure the data transmit competence. Expecting the fully info-sec architecture to achieve the organization rapidly change.
書名頁 i
論文口試委員審定書 ii
授權書 iii
中文摘要 iv
英文摘要 v
誌謝 vi
目錄 vii
表目錄 viii
圖目錄 ix

第一章、緒論 1
1.1研究動機與目的 1
1.2論文架構與研究限制 2
第二章、文獻探討 3
2.1 系統整合技術 3
2.1.1 服務導向架構 3
2.1.2 網路服務 5
2.1.3商業流程執行語言 10
2.1.4 統一塑模語言 UML 12
2.2 資訊安全 14
2.2.1 Web Service安全 15
2.2.2權限控管 18
第三章、研究方法 21
3.1研究架構 21
3.2系統分析 22
3.3系統安全需求 26
第四章、建構陸軍資源整合系統 28
4.1系統介紹 28
4.2流程規劃 29
4.3系統整合架構 36
第五章、系統安全架構 38
5.1權限控管架構 38
5.2 網路安全架構 40
第六章、結論 44
參考文獻 46
[1]Stuart King, “Threats and Solution To Web Services Security,” Web Services, 8-12, 2003.
[2]Will Iverson, “Real world Web Services,” O’REILLY, October 2004.
[3]Booch, G. Jacobson, I. and Rumbaugh, J., “The Unified Modeling Language User Guide,” Addison Wesley, 1999.
[4]Mark O’neill, “Web Services Security,” McGraw-Hill Osborne, USA, 2003.
[5]David C. Chou and Kirill Yurov, “Security development in Web Services environment,” Computer Standards & Interfaces, In Press, Uncorrected Proof, Available online 11, September 2004.
[6]Peter Seibel, “Service-Oriented Architecture – A Field Guide to Integrating XML and Web Services,” PRENTICE HALL, April, 2004.
[7]Karl Gottschallk, Web Services architecture overview, Http://www-128.ibm.com/
[8]Sinan Si Albir, “UML in a Nutsbell,” O’Reilly&Associates Inc., New York, 1999.
[9]Booch, G, Rumbaugh, J. and Jacobson, J., “The Unified Modeling Language for Object-Oriented Development: Documentation Set Version 0.9 Addendum, Rational Software Corp, 1996.
[10]Mark Colan, “Server-Oriented Architecture expands the vision of Web Services,Part , 1,” IBM, 2004, Http://www-106.ibm.com/developerworks/webservices/library/ws-soaintro.html.
[11]Erik Christensen, Francisco Curbera, Greg Meredith, Sanjiva Weerawarana., “Web Service Description Language (WSDL) Version 1.1 W3C Note 15,” March 2001.
[12]Raina Khalaf., “Business process: Learning BPEL4WS Part 2,” August 2002.
[13]Ju Long, Yuan,M.J., Whinston, “Securing a new era of financial services,” IEEE Computer Society, Volume:5, Issue:4, 2003.
[14]Chris Kaler et al, “Web Services Security Specification, Version 1.005,” International Business Machines Corporation, 2002.
[15]Jim Amsden, Tracy Gardner, Catherine Griffin, Sridhar Iyenger, “Draft UML 1.4 Profile for Automated Business Process With a mapping to BPEL 1.0 Version 1.11,” IBM, 2003.
[16]Martin Gudgin, Marc Hadley, Jean-Jacques Moreau, Henrik Frystyk Nielsen, SOAP Version 1.2 Part 1: Messaging Framework, Http://www.w3.org/TR/2001/WD-soap12-part1-20011002/.
[17]Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, “Role-Based Access Control Models,” IEEE computer Volume 29, Number 2, February 1996.
[18]David Ferraiolo and Richard Kuhn, “Role - Based Access Controls,” In Proceedings of 15th NIST - NCSC National Computer Security Conference, Baltimore, MD, pp. 554-563, 1992.
[19]沈炳宏,Smart Client 開發實務 - 使用 Web Services & SOA Http://www.microsoft.com/taiwan/msdn/columns/mvp/200412_smartclient.htm
[20]張思源,「Web 服務安全標準及實務應用」,財團法人資訊工業策進會,台北,2002.
[21]戚玉樑、彭淑芸、賴德優、張琪瑩,「Web Services探索與應用」,全華,台北,2003.
[22]周賢昭、邱炫儒,以網路服務安全政策為基礎之認證架構,第十四屆物件導向技術及應用研討會,2003.
[23]張益嘉、林金龍、何建明,數位典藏系統之權限控管,第二屆數位典藏技術研討會,2003.
[24] 陳文鏘,設計與實作以商業流程為基礎的網際服務組合引擎,國立交通大學資訊工程研究所碩士論文,2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top