Description:
The objective of the system is to
find whether the web application is a genuine one or not. This is done by
authenticating the web application by using a cipher key, which can be obtained
by implementing standard encryption algorithm. This cipher key is used to
identify the fraud web application to avoid misuse of the sensitive
information. After authenticating the web application the authorized users will
be allowed to access the application to get various services and provide
information that includes transactions like inserting, modifying and deleting
records, which vary with different kind of the users in a role based web
application.
The system will check the user’s existence in
the database and provide the set of services with respect to the role of the
user. The application is based on three-tier architecture. The cipher key obtained will help to find the
fraud application. The business logic helps in authenticating the application,
authorizing the users and providing services. The technologies are chosen by
keeping the compatibility and performance as the constraints for the
application.
SOFTWARE
AND HARDWARE SPECIFICATIONS
Hardware:
Processor : Intel Pentium III or Above
Ram : 256 MB or more
Cache : 512
KB
Hard
disk : 16 GB hard disk recommended for primary
partition.
Software:
Opera ting system : Windows XP or later
Front End Software : ASP.NET (C# .NET)
Back End
Software : SQL Server 2005
No comments:
Post a Comment