高校教师评教与工作量管理系统的研究设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在高等教育大众化的今天,在校大学生的数量日益激增,教师的数量、工作量也在不断攀升,怎样用信息化的手段和计算机技术来科学地评价教学、统计分析教学工作量,保证教学质量,是高校教学管理追求的目标。本文通过调查研究,查阅大量国内外相关文献,分析不同学校开发、使用类似系统的情况,学习和研究系统设计的理念,深入学习基于角色访问的控制技术、软件开发设计技术、Oracle数据库等相关知识发现:目前在高校普遍使用的教学评价及教学工作量管理系统,大多侧重于利用Browser/Web Server技术开发。而在某些情况下,采用100%的Browser/Web Server技术开发,存在着系统响应速度慢、服务器开销大、通信带宽要求高、安全性差、总投资不断增加等方面的不足。
     本文从本单位教学评价及工作量统计与核算工作的实际出发,在总结有效利用现有系统经验的基础上,为了更加安全、高效地进行教学评价及工作量统计与核算,从以下几个方面对Client/Server、Browser/Web Server和访问控制技术、数据库技术、网络安全技术进行了分析研究。
     首先,阐述了课题研究的背景及系统开发的原则。高校教师评教与工作量管理系统是一个集Client/Server和Browser/Web Server技术于一体作为数字化校园核心业务的整体系统,可以在基于角色的访问控制模型RBAC(Role-BaesdAccess Control)思想管理用户权限的前提下,辅助教务系统更好实现教学管理的功能。RBAC的核心思想就是将访问权限与角色相联系,通过给用户分配合适的角色,使用户与访问权限间接关联,通过对RBAC模型的分析,设计一个应用模型运用到权限管理系统中,并采用ASP.NET、ADO.NET等技术进行实现,减少授权管理复杂性,降低管理开销,增强权限控制灵活性的需求。
     其次,对系统管理模块、课程管理模块、教学任务管理维护模块、评教管理模块和工作量管理模块构成进行了分析,并利用先进的UML面向对象技术和面向数据流进行需求分析的结构化研究方法进行分析与设计,完成整个系统的合理架构。系统模块主要完成用户的管理和用户的访问控制,课程管理模块和教学任务管理维护模块属于系统的基础模块,主要有实现网上评课管理和工作量管理等功能。网上评课管理,即是通过网上评课,能够同时调动教师和学生的积极性,达到“评”、“教”、“学”结合,促使教师能够根据学生的评价结果,找出原因进行整改,提高和保证了教学质量;工作量管理模块,可以及时准确的统计和核算教学工作量,通过报表分析教学任务,提高教学管理效率。两者都能为学校领导者提供教学改革与教学管理决策支持,从而使得学校信息化管理更加完善。
     第三,研究采用B/S和C/S相结合的架构模式的过程与作用。首先用java开发后台服务,实现复杂的业务逻辑;前台用.Net开发客户端,实现前台交互;通过webservice进行通信。在此基础上着力解决了系统的权限管理简化问题。在RBAC的权限管理基本思想的前提下,根据本系统的特点,改进了RBAC的应用模型。研究中引入“角色”概念,根据不同职务定义相同的角色,给不同的角色分配不同的权限,使角色可以随着部门的变化而改变,从而降低了管理成本,减少了授权管理的复杂性。对系统管理员而言,他们无需具备更加高深的数据库技术和熟练操作的经验,也能加强数据库访问的安全控制。总之,本文通过对数据库精心设计研究,使得系统能够在高访问量时高效运行。
Presently,with the popularization of higher education,the number of college students is increasing greatly,and so is the number of teachers and the workload of teachers.Hence,it becomes the goal of teaching management in high schools to evaluate the teaching effectiveness,and to account and analyze teaching workload through means of informationization and computer technology.Various investigations and studies made by the writer of this paper have led to the discovery as follows:Nowadays,the widely used Teaching Evaluation and Teaching Workload Management System in high schools mostly focuses on the development of Browser/ Web Server technology,while we know,under certain circumstances,100%Browser /Web Server technology development may lead to deficiencies like:slow response of the techonogy system,heavy overheads of the server,high band-width requirements, and poor security and the on-going increase of total investments.The above mentioned discovery is based on accessing to a large number of related documents both home and abroad,analyzing the use of similar systems in different schools, learning the concepts of systems design,and studying intensively RBAC(Role-based Access Control),software development and design technology,Oracle databases and so on.
     Supported by the realities of teaching evaluation,workload statistics and accounting from the writer's experience,based on the efficient use of the knowledge of present-day system,in order to evaluate teachings,account and check workload in a safer and more efficient way,this paper attempts to analyze the Client/Server, Browser/Web Server,Access Control Technology,Database Technology and Network Security Technology from the following aspects:
     First of all,this paper states the research background and the principles of the system development.It holds that Teaching Assessment and Workload Management System in high schools requires the unity of the technologies of Client/ Server and Browser/ Web Server and it is a part of the core business systems in integrated digital campus,and that this system adopts the Access Control Model of RBAC(Role-Based Access Control) to manage the users' authority in order to achieve better effects in Teaching Management.The core of RBAC is to link Access Authority and Roles,and then through the appropriate allocation of roles,users can associate with Access Authority indirectly.Through the analysis of the RBAC Model,and with the help of the technologies of ASP.NET,ADO.NET and so on,a newly designed model can be applied to the Authority Management System with the function of reducing the complexity of Authority Management and the expense of management,and enhancing the flexibility of Access Control.
     Secondly,this paper analyzes the constitution of the System Management Module,the Course Management Module,the Teaching Task Management and Maintenance Module,the Teaching Assessment Management Module,and of the Workload Management Module.Furthermore,this paper puts forward the reasonable construction of the system through the analysis of the advanced UML,and through the analysis of the technology-oriented and stream-oriented requirement.The System Management Module is to achieve the User Management and Access Control.The Course Management Module and the Teaching Task Management and Maintenance Module belong to the basic modules of the system.The whole system is mainly for achieving the on-line Teaching Evaluation Management and Workload Management. The purpose of on-line Teaching Evaluation Management is to mobilize the enthusiasm of teachers and students,achieve the unity of "comments","teaching" and "learning",and then to enhance and ensure the quality of teaching;while the purpose of Workload Management Module is to calculate teaching workload timely and accurately,and to improve teaching management efficiency through analysis of teaching workload.Both of the modules are able to provide decision support in Teaching Reform and Teaching Management.
     Thirdly,this paper probes into the process and significance of the Architecture Pattern which combines the technologies of B/S and C/S.The first step is to accomplish the complex Business Logic by using java-supported Backend Role;then using.Net to develop client,foreground data interactivity could be achieved;and finally,communication could be carried on through webservice.Moreover,this paper focuses on the simplification of the authority management of the system,and based on the concept of authority management,it improves the RBAC applied model according to the characteristics of this system.The concept of "role" is also introduced in this paper.According to the definition of the same role in different positions,different roles are assigned different permissions,and roles can change as the department changes.In this way,it greatly reduces management costs and the complexity of authorization management,and thus helps the system administrators to enhance the safety control of the Access of Database even without advanced database technology or operation experience.In short,through the elaborate design of database, this paper presents us a system running safely when accesses are magnitude.
引文
[1]丁宇新,梅嘉,程虎.国产开放系统平台Java及时编译器的设计与实现[J].计算机学报,1999,(12):1295-1299
    [2]吕延岗,张红瑞等:基于C/S和B/S混合模式的身份识别系的设计与实现[J].计算机与数字工程,2008,(8)
    [3]钟育彬.基于C/S和B/S模式的ERP系统的研究与实现[J].微计算机信息:2006,(11):26-28.
    [4]David Ferraiolo,Rick Kuhn.Role-based accesscontrol[C].Proceedings of 15 th National Computer Security Conference,1992
    [5]B Lampson.Proteetion[j].In:Proc the 5th Annusl Princeton Conf oninformation Sciences and Systems Princeton,New Jersey:Princeton Vniversity Press,1974.437-443
    [6]许春根,江于,严悍.基于角色访问控制的动态建模[J].计算机工程,2002,28(1):116
    [7]何斌,顾健.基于角色访问控制的权限管理系统[J].计算机工程,2004年12月,30卷增刊:326-328.
    [8]David F Ferraiolo,John F Barkley,D Richard Kuhn.A Role-Based Access Control Model and Reference Implementation Within a Corporate lntranet[J]:ACM Transactions on Information and System Security,1999,2(1):34-31
    [9]R S Sandhu.Lattice-based access.control models[J].IEEE Computer,1993,26(11):9-19
    [10]D.Ferraiolo,R.Sandhu,S.Gavrila,D.R.Kuhn and R.Chandramouli."Proposed NIST Standard for Role-based Access Control".ACM Transactions on Information and System Security.Vol4,Aug 2001,pp224-274
    [11]许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报2005,(4)686-693
    [12]Sandhu R S.Role-based Access Control Models[J].Computer IEEE,1996,29(2):38-47.
    [13]Ferraiolo D,Sandhu R,Gavrila S,et al.A proposed standard forrole-based access control[J].ACM Transactionson Information and System Security,2001,4(3):224-274
    [14]夏鲁宁,荆继武.一种基于层次命名空间的RABC管理模型[J].计算机研究与发展,2007(12):2020-2027
    [15]汪厚祥,李卉.基于角色的访问控制研究[J].计算机应用研究,2005
    [16]靳泰戈,余航,冯斌,周先涛等.一种基于角色的访问控制模型及其实现[J].计算机应用研究,2005,(12):138-140
    [17]龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,(5)868-876页。
    [18]李晓峰,冯登国,徐震.一种通用访问控制管理模型[J].计算机研究与发展,2007,44(6):947-957
    [19]林泊,周明辉,刘天成,黄罡,梅宏.一个J2EE应用服务器的Web容器集成框架[J].软件学报,2006,17(5):1195-1203
    [20]樊银亭,何鸿云.基于客户机/服务器体系的二层与三层结构研究[J].计算机应用研究,2001(12):23-24
    [21]曾隽芳,温大勇,杨一平.电子政务系统基于角色的权限管理研究[J].计算机工程与应用,2004(22)
    [22]薛胜军,颜昌隆.分级RBAC模型及其在多校区管理系统中的应用[J].计算机与数字工程,2008,(5):64-66
    [23]曹春,马晓星,吕建.一个面向服务计算的访问控制模型[J].计算机学报,2006,(7):1209-1216
    [24]J EFFREY R.框架设计:CLR VIA CJ HJ[M].2版.北京:清华大学出版社,2006
    [25]张伟,石纯一.Agent组织结构设计的一种形式语义[J].软件学报,2002,13(3):447-452
    [26]路鹏,殷兆麟.基于Spring的Acegi安全框架认证与授权的分析及扩展[J].计算机工程与应用,2007,28(6):1313-1316
    [27]FERRAIOLO D,KU HN R.Role-based access controls[C].In:Proceedings of the 15th NIST-NCSCNational Computer Security Conference,1992:554-563.
    [28]COULOURIS G,DOLL IMORE J,ROBERTS M.Role and task-based access control in the PerDiSgroupware platform[C].In:Proceedings of the ACM Workshop on Role2Based Access Control.George Mason University,1998:115-121.
    [29]韩蓄,张景,李军怀,等.基于角色的个性化门户网站设计与实现[J].计算机工程与应用,2005(4):153.
    [30]Sejong OH,Park S.Task2role2based Access ControlModel.Information System,2003,28:533-562.
    [31]张红军,李亚芬,周小林.大型数据库库应用系统中基于角色的权限管理方案[J].现代计算机,2001(5).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700