CFP last date
20 January 2025
Reseach Article

Forward Engineering based Implementation of TOS in Social Networking

by Nitish Pathak, Girish Sharma, B. M. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 11
Year of Publication: 2014
Authors: Nitish Pathak, Girish Sharma, B. M. Singh
10.5120/17861-8757

Nitish Pathak, Girish Sharma, B. M. Singh . Forward Engineering based Implementation of TOS in Social Networking. International Journal of Computer Applications. 102, 11 ( September 2014), 33-38. DOI=10.5120/17861-8757

@article{ 10.5120/17861-8757,
author = { Nitish Pathak, Girish Sharma, B. M. Singh },
title = { Forward Engineering based Implementation of TOS in Social Networking },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 11 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number11/17861-8757/ },
doi = { 10.5120/17861-8757 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:52.149162+05:30
%A Nitish Pathak
%A Girish Sharma
%A B. M. Singh
%T Forward Engineering based Implementation of TOS in Social Networking
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 11
%P 33-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The present generation of youth begins the day with the Facebook or other social website. Hundreds of millions of people all over the world make use of social websites, Internet portals, blogs, Wikis, etc. These sites such as MySpace, Facebook and YouTube have the essential features and equipped with the necessary computing facilities to keep gigantic online communities get going with secure manner. Due to rapid growth of networking, use of social networking sites in day to day life, data sharing, computer security has made a vital part of computer research & development. For maintaining the security in various applications like E-commerce Online goods and services, Banking, Marketplace services Advertising, Auctions, Comparison shopping, Mobile commerce Payment, Ticketing, An electronic payment system (EPS),Online insurance policy management, we have to use high secured operating systems. In this regard a number of extremely secure operating systems i. e. Trusted Operating Systems like SELinux, Argus, Trusted Solaris, Virtual Vault have been developed by companies such as Argus-Systems Group, Hewlett-Packard, and Sun Microsystems to handle the increasing need of security. Normally, due to high security reason these operating systems are being used in defense. But still these secure operating systems have limited scope in commercial sector and are not popular in corporate due to lower performance; actually this security will come at a cost. In this paper we will propose SPF Model to maintain the balance between security and performance for these operating systems. This SPF model of TOS can be implement for various applications. For implementation of these SPF based trusted operating system we propose object oriented based Code generation i. e. forward engineering i. e. process of generating source code from one or more OO Rational Rose model for web application like social networking. In this research paper we will discuss the issues and UML-based software development solutions for SPF to manage the security, performance and modeling for Social networking sites.

References
  1. M. Saravanan,G. Prasad, Karishma Surana, D. Suganthi,"Labeling Communities using Structural properties",International Conference on Advances in Social Networks Analysis and Mining,2010.
  2. Roy A, Karforma S, A Survey on E-Governance Security, International Journal of Computer Engineering and Computer Applications (IJCECA). Fall Edition 2011, Vol 08 Issue No. 01, Pp: 50-62, ISSN 0974-4983.
  3. Mark Aldrich. Secured Systems and Ada: A Trusted System Software Architecture. Proceedings of TRI-Ada, 2001.
  4. Philip Raeth, Maurice Kügler, Stefan Smolnik,"The Impact of Organizational Social Web Site Usage on Work Performance: A Multilevel Structural Interaction Perspective", 45th Hawaii International Conference on System Sciences, 2012.
  5. ABRAMS95 Michael Abrams, et. al. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, 1995.
  6. http://cairo. cs. uiuc. edu/publications/papers/thesis-achu. pdf
  7. http://www. ijric. org/volumes/Vol8/Vol8No8. pdf
  8. Booch, G. , Jacobson, I. , Rumbaugh, J. The Unified Modeling Language Users Guide. Addison Wesley, Reading, MA, 1998.
  9. Argus Systems Group, Inc. http://www. argussystems. com/.
  10. John Barkley. Managing Role/Permission Relationships Using Object Access Types. Third ACM Workshop on Role-Based Access Control, 1998.
  11. Paul C. Clark. Policy-Enhanced Linux. Proceedings of the 23rd National Information Systems Security Conference, 2000.
  12. Ivar Jacobson, Magnus Christerson, Patrik Jonsson, and Gunnar Övergaard, Object-Oriented Software Engineering: A Use Case Driven Approach, Addison-Wesley, Wokingham, England, 1992. David Ferraiolo and Richard Kuhn. Role-Based Access Control. Proceedings of the 15th National Computer Security Conference, 2004.
  13. Christian Friberg and Achim Held. Support for Discretionary Role-Based Access Control in ACL-oriented Operating Systems. Proceedings of the Second ACM Role-Based Access Control Workshop, 2005.
  14. James B. D. Joshi, Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. Security Models for Web-Based Applications, 2001.
  15. http://en. wikipedia. org/wiki/Applications_of_UML
  16. Tamar Richner and St´ephane Ducasse. Recovering high-level views of object-oriented applications from static and dynamic information. In Hongji Yang and Lee White, editors, Proceedings ICSM'99 (International Conference on Software Maintenance). IEEE, September 1999.
  17. K. Koskimies, T. M¨annist¨o, T. Syst¨a, and J. Tuomi, "Automated Support for Modeling OO Software", IEEE Software, 15, 1, January/February 1998, pp. 87–94.
  18. http://www. ksc. com/articles/usecases. htm
  19. Donald G. Firesmith, "Modeling the Dynamic Behavior of Systems, Mechanisms, and Classes with Scenarios," Report on Object-Oriented Analysis and Design (ROAD), SIGS Publications, Vol. 1, No. 2, New York, New York, July/August 1994, pages 32-36.
  20. Power, J. F. & Malloy, B. A. (2000), an approach for modeling the name lookup problem in the C + + programming language, in `ACM Symposium on Applied Computing', Como, Italy.
  21. Gómez J. , Cachero C. , Pastor O. Extending a Conceptual Modeling Approach to Web Application Design. In Proc. Conference on Advanced Information Systems Engineering (CAiSE), LNCS 1789, Springer- Verlag, 2000, pp. 79-93.
Index Terms

Computer Science
Information Sciences

Keywords

SPF- Security Performance Flexibility Software architecture UML Code generation SELinux- Security-Enhanced Linux OO Rose Mode-Object Oriented Rose Model TOS -Trusted Operating System