2014
DOI: 10.5120/17861-8757
|View full text |Cite
|
Sign up to set email alerts
|

Forward Engineering based Implementation of TOS in Social Networking

Abstract: The present generation of youth begins the day with the Facebook or other social website. Hundreds of millions of people all over the world make use of social websites, Internet portals, blogs, Wikis, etc. These sites such as MySpace, Facebook and YouTube have the essential features and equipped with the necessary computing facilities to keep gigantic online communities get going with secure manner. Due to rapid growth of networking, use of social networking sites in day to day life, data sharing, computer sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…We should identify various operations in product purchase web application to disable the undesirable operations to improve the performance in all respects (Pathak et al 2014;Gómez et al 2000).…”
Section: Problem Description and Solutionmentioning
confidence: 98%
See 2 more Smart Citations
“…We should identify various operations in product purchase web application to disable the undesirable operations to improve the performance in all respects (Pathak et al 2014;Gómez et al 2000).…”
Section: Problem Description and Solutionmentioning
confidence: 98%
“…As we know all security checks are not important in all web applications. Selection of these criteria will vary from one web application to another application (Pathak et al 2014). High quality of system architecture is essential for the long term success of a software product.…”
Section: Problem Description and Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…In UML, a class is represented as a box with three vertical sections. The top section shows the name of the class [23]. The middle section displays the variables belonging to the class, with symbols representing the visibility (public, protected, or private) and properties (constant or static).…”
Section: Problem Description and Solutionmentioning
confidence: 99%