The LAN Information Integration Model Research Based on User's Individual Needs

Article Preview

Abstract:

A maximum-meet user’s individual needs integration model was presented in this paper, which integrated information integration thinking, Web3.0 with open platform. The model embedded Service-Oriented Architecture (SOA) framework realized the information integration. Then combined the OpenID ,OAuth, and role-based access control (RBAC) achieved single sign-on and authorization system; finally, based on Maps API Mashup applications realized the interaction between the LAN Web information and maps. The model has the advantage of friendly interface, strong replicability, and high security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1527-1535

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C.L. Bao and X.L, in Chinese: Information System (2012).

Google Scholar

[2] Q.Z. Huang, in Chinese: China Audio-Visual Education (2012).

Google Scholar

[3] H.B.Hu, in Chinese: Information Resource Management (2011).

Google Scholar

[4] L.L. Zhang, in Chinese: Library Information Service (2008).

Google Scholar

[5] D. Liu, Z.J. Zhang and N. Zhang, in Chinese: Information Communication Technology (2009).

Google Scholar

[6] J. Ma, X.M. Ding, in Chinese: Computer Engineering Design (2008).

Google Scholar

[7] W.H. Peng, Z.K. Yang and C.L. Zhao, in Chinese: Compute. Technology Design (2006).

Google Scholar

[8] G. Niu, Z.N. Zhang, in Chinese: Microcomputer Application (2009).

Google Scholar

[9] X.D. Li, Y. Yang and W.C. Guo, in Chinese: Computer Engineering (2006).

Google Scholar

[10] Q. Wang, L.M. Wu, in Chinese: Computer Engineering (2008).

Google Scholar

[11] Helenius, K: OpenID and identity management in consumer services on the Internet. Proceedings of the TKK T-110.5190 Seminar on Internetworking, April 27, 2009, Helsinki University of Technology (2009)

Google Scholar

[12] Gonzalez, J.F., M.C. Rodriguez, M.L. Nistal and L.A. Rifon: Computer Security (2009).

Google Scholar

[13] T. Xu, T.N. Lei, in Chinese: Software Guide (2009).

Google Scholar

[14] N. Li, and W.B. Ji, in Chinese: IEEE Security Privacy (2011).

Google Scholar

[15] Joshi, J.B.D., E. Bertino, U. Latif and A. Ghafoor: Knowledge Data Engineering (2005).

Google Scholar

[16] S.L. Zhang, Y.L. Shen, in Chinese: Computer Engineering Design (2009).

Google Scholar

[17] X. Liu, Y. Hui, W. Sun and H. Liang, in Chinese: Proceedings of the IEEE Congress on Services (2007).

Google Scholar

[18] Zarandioon, S., D. Yao and V. Ganapathy : OMOS: A framework for secure communication in mashup applications. Proceedings of the Annual Computer Security Applications Conference (2008).

DOI: 10.1109/acsac.2008.25

Google Scholar