Open Access Open Access  Restricted Access Subscription or Fee Access

Developing a Worldwide Social Assistance Community with Regard to Superior Quality of Internet Assistance

N. Kavitha, H. Ambika, A. Parthasarathy, R. Dhashnamoorthy

Abstract


Web products and services experienced an exceptional impact online with regard to assisting the sent out service-based economic climate over a world-wide level. On the other hand, despite the excellent advancement, their uptake over a Internet level may be even less as compared to at first envisioned. The particular remote location of products and services and also lacking societal interactions amid related products and services are defined as causes of poor people uptake. In this particular document, we all suggest attaching the particular separated program islands in to a world-wide societal program network to reinforce the particular services’ sociability over a world-wide level. First, we all suggest associated societal service-specific concepts according to associated files concepts with regard to publishing products and services around the available Internet since associated societal products and services. Then, we all propose a new composition with regard to developing the particular world-wide societal program network subsequent associated societal service-specific concepts according to sophisticated network practices. Subsequent, a strategy is usually proposed help the particular exploitation on the world-wide societal program network, delivering Linked Social Solutions to be Assistance. Last but not least, experimental results indicate our tactic may resolve the products program breakthrough difficulty, bettering both the program getting time period and the good results price by exploring service-to-service using the world-wide societal program network.


Keywords


Ontology, Back links, Service Provider, Semantic Internet Assistance, Service of a Service and Quality of Service.

Full Text:

PDF

References


. Devdatta Akhawe, Adam Barth, Peifung Lam, John Mitchell, Dawn Song. "Towards a Formal Foundation of Web Security," IEEE Computer Security Foundations Symposium, 2010

. Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, Llanos Abad. "Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps," ACM FMSE, 2008

. Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, G. Pellegrino, A. Sorniotti. "From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure?" IFIP Information Security Conference (SEC), 2011

. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy."Verified implementations of the information card federated identity-management protocol, ACM ASIACCS 2008.

. Adam Barth, Collin Jackson, and John C. Mitchell. “Robust Defenses for Cross-Site Request Forgery,” ACM CCS, 2008

. Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz and V.N. Venkatakrishnan. "NoTamper: Automatically Detecting Parameter Tampering Vulnerabilities in Web Applications," ACM CCS 2010

. Blue Research. "Consumer Perceptions of Online Registration and Social Sign-In," http://janrain.com/consumer-research-social-signin

. Andrew Bortz, Adam Barth, and Alexei Czeskis. “Origin Cookies: Session Integrity for Web Applications,” W2SP 2011.

. Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. ACM Trans. Computer Systems 8, 1, 18-36. 1990.

. Hao Chen, David Wagner and Drew Dean. "Setuid demystified,"USENIX Security Symposium, San Francisco, CA, August 2002

. Weidong Cui, Jayanthkumar Kannan, Helen J. Wang. "Discoverer: Automatic Protocol Reverse Engineering from Network Traces," USENIX Security Symposium 2007

. Facebook. "White hats," http://www.facebook.com/whitehat

. Facebook. "OAuth Dialog," http://developers.facebook.com/docs /reference/dialogs/oauth/

. Facebook Developers. “Legacy Canvas Auth, ”http://developers.facebook.com/docs/authentication/fb_sig/

. Fiddler Web Debugger. http://www.fiddler2.com/fiddler2

. Firebug. http://getfirebug.com/

. About Freelancer. http://www.freelancer.com/info/about.php

. Google. "Security Hall of Fame," http://www.google.com/about/company/halloffame.html

. Google Code. "Federated Login for Google Account Users," http://code.google.com/apis/accounts/docs/OpenID.html

. Thomas Groß. "Security analysis of the SAML single sign-on browser/artifact profile," ACSAC2003

. S. M. Hansen, J. Skriver, and H. R. Nielson. "Using static analysis to validate the SAML single sign-on protocol," Workshop on Issues in the Theory of Security, 2005

. Brian Kissel. "OpenID 2009 Year in Review," http://openid.net/2009/12/16/openid-2009-year-in-review/

. LocalConnection (in flash.net). http://help.adobe.com/en_US /FlashPlatform/reference/actionscript/3/flash/net/LocalConnection.html?filter_flex=4.1&filter_flashplayer=10.1&filter_air=2

. Los Angeles Times. "The Sims Social bests FarmVille as the second largest Facebook game," http://latimesblogs.latimes.com/entertainmentnewsbuzz/2011/09/sims-social-surpasses-farmville-assecond-largest-facebook-game.html

. Catherine Meadows. "Language Generation and Verification in the NRL Protocol Analyzer," Computer Security Foundations 1996.

. Microsoft. "INFO: Internet Explorer Does Not Send Referer Header in Unsecured Situations," http://support.microsoft.com/kb/178066

. Jonathan K. Millen. "The Interrogator Model," IEEE Symposium on Security and Privacy 1995.

. OASIS Standard. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.