SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com
679
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
A Novel Secure Cloud SAAS Integration for
User Authenticated Information
C. V. Satyanarayana
Research Scholar, Rayalaseema University,
Kurnool, Taminadu, India
Dr. P. Suryanarayana Babu
Research Supervisor, Department of Computer
Science, Rayalaseema University,
Kurnool, Tamilnadu, India
ABSTRACT
Organizations are spending a lot of money to maintain
their business data using legacy Enterprise content
management systems [1], tools, hardware support and
maintenance, which are not satisfying the consumers.
Box is Novel ECM system which allows the users to
store, view, search large value of data with lesser
bandwidth to increase user experience for modern
business. Modern business running on new enterprise
cloud platforms like Amazon, eBay, Salesforce.
Persistence of business user’s data is simpler and
faster with this platform and is really an emerging
solution for the current industry. The real-time
integration between cloud SaaS application with on-
premises content management systems (SharePoint
[2], box [3], Oracle Web Center [4], Nuxeo [5], Open
Text [6], Dell Documentum [7], IBM FileNet p8[8],
Docushare [9], On Base [10], Laser Fiche [11],
SpringCM [12], Seismic [13], Lexmark [14], M-Files
[15], Alfresco [16], Media Bank [17], Veeva Vault
[18], etc.)
In this paper, we are proposing a new paradigm of
how Cloud SaaS applications integrate with novel
ECM’s for modern business. We performed real-time
integration from SFDC to box with a business use
case, we did bi-directional data synchronization
between SFDC to box and vice versa.
I. INTRODUCTION
Enterprise Content Management used to store web
content, forms processing, Rich media files (Audio,
Video), email, confidential documents, host generated
reports, fax and scanned files at a central repository.
ECM has a lot of advantages like concurrent access,
Email as a business asset, Quick Customer service,
and documents in the central repository, difficult to
contribute to websites. ECM allows people to connect
with ERP, CRM, SCM, Desktop Applications,
Communities and any wireless communication
devices. As per the international survey, 30% people
are spending time for the content searching and there
is 85% unstructured information. Globally 79% of IT
companies have 2 repositories and 25% of companies
have 15 and above. Every ECM must have basic
capabilities (security, search, storage, Integration,
collaboration, workflow, record management and
personalized delivery) to access any information at
any time. [19] Gartner stated IBM offers ECM and
has significant growth. ECM is useful for big
enterprises (US Army have 1,500,000 user’s data with
around 100,000 forms) to return good ROI by
optimizing/automate the legacy process illustrated in
the fig.1. (Courtesy: IBM Software Group).
Fig 1: eForms (Source: IBM Software Group)
Box [20] – a modern cloud-based enterprise content
management offers novel services (Content
organization and delivery with context, simple
workflow and governance). Deliver connect with
connect handles content classification, stop endless
searching. Workflow management improves the
transparency, regulated process, and optimizes the
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com
680
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
errors. Box provides self-service IT capability for
business partners, vendors, customers.
II. DESIGN AND DEVELOPMENT
Use case:
Bi-Directional Synchronization Sequence Steps:
Step 1: Login into salesforce.com
Step 2: Create a new Account Record in Account
Object, which navigates to its detailed page
Step 3: Create a new Note related list and enter Title,
Description the Save
Step 4: ‘Save’ fires a pre-configured Trigger with two
events (After insert / After Update)
Step 5: Trigger calls “Web service”.
5.1: Once web service Callout then, constructor will
cause execution of a class to get access token
5.2: Class sends a request and get response as key
“Authorization Key”
5.3: Once Token generated as response, web service
callout the box “end point URL”
5.4: Folder and File creation happen based on the
Parent id (Account ID)
5.5: Once file created, web service receives “Folder &
File” details as response
Step 6: Web service response updates the SFDC
detailed record.
The enterprise Use case, design strategy as illustrated
in the below diagram
.
Fig.1. Architecture for SFDC integration with Box Content Management
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com
680
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
Implementation of Use case
The overall scenario is implemented in several stages.
Initial stage carried out the box ECM configuration to
take care folder accessibility (Authorization) publicly.
To enable folder accessibility public,2048 bit RSA
private key and the public key generated by OpenSSL
using Cygwin in Windows environment. Private and
public key generation done with below commands
openssl pkcs8 -topk8 -inform PEM -outform DER -
in private_key.pem -out rsaprivkey.der –nocrypt
( 1 )
openSSL pkcs8 -in private_key.pem -topk8 -nocrypt -
out certificatename.pk8  ( 2 )
Once the private and public key generated and must
submit public key in the box public key management
which provides a KeyID “3n7jqtg7”. The Header has
three arguments, alg refers the algorithm (RS256,
RS384, RS512), type stands type of token (default is
JWT) and kid is public key id generated by box. The
header looks like as follows:
.
string header='{"alg": "RS256","typ":
"JWT","kid": "3n7jqtg7"}';  ( 3 )
Fig. Generated Public Key
Fig. Generated Private Key
Trigger Implementation:
Once the Note created in Account detail page causes
Trigger execution. The trigger is automatic functional task
executed in two events, namely After Insert, After Update.
If(trigger.isinsert && trigger.isafter)
{
For(Note nt:trigger.new){
Id parentid= nt.parentId;
Schema.DescribeSObjectResult sa
=parentid.getSObjectType().getDescribe();
if(sa.Name.tolowercase()=='account'){
createfileandfoldersinbox.createdfilesand
folderinbox(parentid,nt.id,
nt.Title,nt.body,true);
}
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com
682
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
if(sa.Name.tolowercase()=='opportunity'
|| sa.Name.tolowercase()=='contact'){
createfileandfoldersinbox.createdfilesand
folderother(parentid,nt.id,
nt.title,nt.body,true);
}
}
}
Trigger call the method
“createdfilesandfolderother” in the web service
“createfileandfoldersinbox” by passing the
parameters parented, id, Title, body,
Boolean value (true / false).
Createfileandfoldersinbox execute
asynchronous way by made “Future”
callout. Web service call external
Utility class “boxaccessandrefereshtoken” to get
the access token and assign to the
folderid.
Folderid= boxaccessandrefereshtoken.
boxaccrecordid (parentid, noteid, tittle,
body, insertfile);
“Boxaccrecordid” method call another utility method
called “Boxhalfuserauthenticationcls.
Boxhalfuserauthentication” which returns the
response as an authorization token. Once generate and
submit the public key, you can able to send user
OAuth and enterprise token by JWT (JSON Web
Token) grant. Each and every JWT assertion have
mainly three components namely Header, Claims and
the Signature. The header has an algorithm support
for JWT signature, Claims contain the information
required to authenticate and generate a correct token,
Signature searches the application and validated by
the public key. The pseudo code of the utility class as
follows:
String claim_set =
'{"iss":"9s9i33f74i3uth9pu6d7lfbfu3sffat6"';
claim_set+=',"sub":"792309226"';
claim_set+=',"box_sub_type":"user"';
claim_set+=',"aud":"https://api.box.com/oauth2/tok
en"';
claim_set += ',"jti":"'+jti+'"';
claim_set += ',"exp":'+exptime1+'}';
String claim_set_Encode =
EncodingUtil.base64Encode(blob.valueof(claim_set));
String Singature_Encode =
Header_Encode+'.'+claim_set_Encode;
string key=’private key specified above';
blob privateKey = EncodingUtil.base64Decode(key);
Singature_Encode =
Singature_Encode.replaceAll('=','');
Httprequest req = new HttpRequest();
HttpResponse res = new HttpResponse();
req.setEndpoint('https://api.box.com/oauth2/token')
;
req.setMethod('POST');
req.setHeader('ContentType','application/x-www-form-
urlencoded');
String grt = 'urn:ietf:params:oauth:grant-type:jwt-bearer';
List<string> urlParams = new List<string>
{'grant_type='+grt, ‘client_id=' +
EncodingUtil.urlEncode('9s9i33f74i3uth9pu6d7lfbfu3sffat6
', 'UTF-8'), 'client_secret=' +
EncodingUtil.urlEncode('068tibjjPovMcRr8qXNRhIq8wQKq
ZGSu', 'UTF-8'), 'assertion='+JWT};
string body = string. join(urlParams, '&');
system. debug('=====body ======'+body );
req. setBody(body);
res = h.send(req);
string Response = res.getBody() +' '+ res.getStatusCode();
Finally, the response variable receives key value
(Authorization token).
CONCLUSION
The modern enterprise business following cloud-
based paradigm, which offers the shared services, pay
and use the mechanism, repository, Infrastructure and
working as Platform as well. Modern ECM allows
you to maintain enterprise data through the cloud. The
SAAS connectivity, data synchronization with ECM
is a challenging task in terms of governor limitation.
We proposed a novel approach to synchronize SAAS
data with ECM with authorization user. The proposed
technique provides a public/private key for the user to
access ECM content seamlessly. We integrated
Salesforce CRM SAAS application with modern
ECM called box to evaluate the performance of the
proposed solution by implementing custom web
services, which outperform than other techniques in
terms of speed and reliability.
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com
683
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
REFERENCES
1) Enterprise content management ,
https://en.wikipedia.org/wiki/Enterprise_content_
management.
2) SharePoint ,detailed information available at
https://products.office.com/en-us/sharepoint.
3) Box Cloud storage company, detailed information
available at https://www.box.com.
4) Oracle Web center , detailed information available
at
http://www.oracle.com/technetwork/middleware/
webcenter/suite/overview/index.html.
5) Nuxeo , detailed information available at
https://doc.nuxeo.com.
6) Open Text, detailed information available at
http://www.opentext.com/.
7) Dell Dcoumentum, detailed information available
at http://www.opentext.com/.
8) IBM FileNet p8 , detailed information available at
http://www.ibm.com/support/knowledgecenter/SS
GLW6.
9) Docushare, detailed information available at
https://docushare.com/.
10) On Base, detailed information available at
https://www.onbase.com/en/.
11) Laser Fiche, detailed information available at
https://www.laserfiche.com/.
12) SpringCM , detailed information available at
https://www.springcm.com/.
13) Seismic, detailed information available at
https://seismic.com/.
14) Alfresco content services, detailed information
available at
https://www.alfresco.com/platform/content-
services-ecm.
15) Lexmark , detailed information available at
https://www.lexmark.com/en_in.html.
16) M-Files, detailed information available at
https://www.m-files.com/
17) Media Bank, detailed information available at
https://www.mediabank.me/.
18) Veeva Vault, detailed information available at
https://www.veeva.com/products/enterprise-
content-management/.
19) Gartner Report
http://mediaproducts.gartner.com/reprints/emc/art
icle5/article5.html
20) Box enterprise content management
https://www.box.com/content-management

Weitere ähnliche Inhalte

Was ist angesagt?

Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Understanding GDPR Compliance and How to Easily Protect Data
Understanding GDPR Compliance and How to Easily Protect DataUnderstanding GDPR Compliance and How to Easily Protect Data
Understanding GDPR Compliance and How to Easily Protect DataGoose & Gander
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET Journal
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...rahulmonikasharma
 
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security ToolsTomasz Poszytek
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid ithman10010
 
Data management in cloud study of existing systems and future opportunities
Data management in cloud study of existing systems and future opportunitiesData management in cloud study of existing systems and future opportunities
Data management in cloud study of existing systems and future opportunitiesEditor Jacotech
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlineNerea
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper finalZero2Ten
 

Was ist angesagt? (16)

Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
 
Understanding GDPR Compliance and How to Easily Protect Data
Understanding GDPR Compliance and How to Easily Protect DataUnderstanding GDPR Compliance and How to Easily Protect Data
Understanding GDPR Compliance and How to Easily Protect Data
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
 
Business intelligent
Business intelligentBusiness intelligent
Business intelligent
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
 
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid it
 
Data management in cloud study of existing systems and future opportunities
Data management in cloud study of existing systems and future opportunitiesData management in cloud study of existing systems and future opportunities
Data management in cloud study of existing systems and future opportunities
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper final
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 

Ähnlich wie A Novel Secure Cloud SAAS Integration for User Authenticated Information

Step4 managementsendsorderw
Step4 managementsendsorderwStep4 managementsendsorderw
Step4 managementsendsorderwHüseyin Çakır
 
Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018Microsoft 365 Developer
 
Extending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL ServerExtending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL ServerKesavan Munuswamy
 
A Review Of Computerized Payroll System
A Review Of Computerized Payroll SystemA Review Of Computerized Payroll System
A Review Of Computerized Payroll SystemApril Knyff
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMIRJET Journal
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET Journal
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET Journal
 
.net programming using asp.net to make web project
 .net programming using asp.net to make web project .net programming using asp.net to make web project
.net programming using asp.net to make web projectKedar Kumar
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET Journal
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management SystemMike Taylor
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
2016 Allegro EMEA Customer Summit - Jacob Saunders
2016 Allegro EMEA Customer Summit - Jacob Saunders2016 Allegro EMEA Customer Summit - Jacob Saunders
2016 Allegro EMEA Customer Summit - Jacob SaundersAllegroMarketing
 

Ähnlich wie A Novel Secure Cloud SAAS Integration for User Authenticated Information (20)

Step4 managementsendsorderw
Step4 managementsendsorderwStep4 managementsendsorderw
Step4 managementsendsorderw
 
Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018
 
Extending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL ServerExtending Role Security in Analysis Services for SQL Server
Extending Role Security in Analysis Services for SQL Server
 
A Review Of Computerized Payroll System
A Review Of Computerized Payroll SystemA Review Of Computerized Payroll System
A Review Of Computerized Payroll System
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
.net programming using asp.net to make web project
 .net programming using asp.net to make web project .net programming using asp.net to make web project
.net programming using asp.net to make web project
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
2016 Allegro EMEA Customer Summit - Jacob Saunders
2016 Allegro EMEA Customer Summit - Jacob Saunders2016 Allegro EMEA Customer Summit - Jacob Saunders
2016 Allegro EMEA Customer Summit - Jacob Saunders
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Kürzlich hochgeladen (20)

Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

A Novel Secure Cloud SAAS Integration for User Authenticated Information

  • 1. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com 679 IJTSRD | May-Jun 2017 Available Online @www.ijtsrd.com A Novel Secure Cloud SAAS Integration for User Authenticated Information C. V. Satyanarayana Research Scholar, Rayalaseema University, Kurnool, Taminadu, India Dr. P. Suryanarayana Babu Research Supervisor, Department of Computer Science, Rayalaseema University, Kurnool, Tamilnadu, India ABSTRACT Organizations are spending a lot of money to maintain their business data using legacy Enterprise content management systems [1], tools, hardware support and maintenance, which are not satisfying the consumers. Box is Novel ECM system which allows the users to store, view, search large value of data with lesser bandwidth to increase user experience for modern business. Modern business running on new enterprise cloud platforms like Amazon, eBay, Salesforce. Persistence of business user’s data is simpler and faster with this platform and is really an emerging solution for the current industry. The real-time integration between cloud SaaS application with on- premises content management systems (SharePoint [2], box [3], Oracle Web Center [4], Nuxeo [5], Open Text [6], Dell Documentum [7], IBM FileNet p8[8], Docushare [9], On Base [10], Laser Fiche [11], SpringCM [12], Seismic [13], Lexmark [14], M-Files [15], Alfresco [16], Media Bank [17], Veeva Vault [18], etc.) In this paper, we are proposing a new paradigm of how Cloud SaaS applications integrate with novel ECM’s for modern business. We performed real-time integration from SFDC to box with a business use case, we did bi-directional data synchronization between SFDC to box and vice versa. I. INTRODUCTION Enterprise Content Management used to store web content, forms processing, Rich media files (Audio, Video), email, confidential documents, host generated reports, fax and scanned files at a central repository. ECM has a lot of advantages like concurrent access, Email as a business asset, Quick Customer service, and documents in the central repository, difficult to contribute to websites. ECM allows people to connect with ERP, CRM, SCM, Desktop Applications, Communities and any wireless communication devices. As per the international survey, 30% people are spending time for the content searching and there is 85% unstructured information. Globally 79% of IT companies have 2 repositories and 25% of companies have 15 and above. Every ECM must have basic capabilities (security, search, storage, Integration, collaboration, workflow, record management and personalized delivery) to access any information at any time. [19] Gartner stated IBM offers ECM and has significant growth. ECM is useful for big enterprises (US Army have 1,500,000 user’s data with around 100,000 forms) to return good ROI by optimizing/automate the legacy process illustrated in the fig.1. (Courtesy: IBM Software Group). Fig 1: eForms (Source: IBM Software Group) Box [20] – a modern cloud-based enterprise content management offers novel services (Content organization and delivery with context, simple workflow and governance). Deliver connect with connect handles content classification, stop endless searching. Workflow management improves the transparency, regulated process, and optimizes the
  • 2. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com 680 IJTSRD | May-Jun 2017 Available Online @www.ijtsrd.com errors. Box provides self-service IT capability for business partners, vendors, customers. II. DESIGN AND DEVELOPMENT Use case: Bi-Directional Synchronization Sequence Steps: Step 1: Login into salesforce.com Step 2: Create a new Account Record in Account Object, which navigates to its detailed page Step 3: Create a new Note related list and enter Title, Description the Save Step 4: ‘Save’ fires a pre-configured Trigger with two events (After insert / After Update) Step 5: Trigger calls “Web service”. 5.1: Once web service Callout then, constructor will cause execution of a class to get access token 5.2: Class sends a request and get response as key “Authorization Key” 5.3: Once Token generated as response, web service callout the box “end point URL” 5.4: Folder and File creation happen based on the Parent id (Account ID) 5.5: Once file created, web service receives “Folder & File” details as response Step 6: Web service response updates the SFDC detailed record. The enterprise Use case, design strategy as illustrated in the below diagram . Fig.1. Architecture for SFDC integration with Box Content Management
  • 3. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com 680 IJTSRD | May-Jun 2017 Available Online @www.ijtsrd.com Implementation of Use case The overall scenario is implemented in several stages. Initial stage carried out the box ECM configuration to take care folder accessibility (Authorization) publicly. To enable folder accessibility public,2048 bit RSA private key and the public key generated by OpenSSL using Cygwin in Windows environment. Private and public key generation done with below commands openssl pkcs8 -topk8 -inform PEM -outform DER - in private_key.pem -out rsaprivkey.der –nocrypt ( 1 ) openSSL pkcs8 -in private_key.pem -topk8 -nocrypt - out certificatename.pk8  ( 2 ) Once the private and public key generated and must submit public key in the box public key management which provides a KeyID “3n7jqtg7”. The Header has three arguments, alg refers the algorithm (RS256, RS384, RS512), type stands type of token (default is JWT) and kid is public key id generated by box. The header looks like as follows: . string header='{"alg": "RS256","typ": "JWT","kid": "3n7jqtg7"}';  ( 3 ) Fig. Generated Public Key Fig. Generated Private Key Trigger Implementation: Once the Note created in Account detail page causes Trigger execution. The trigger is automatic functional task executed in two events, namely After Insert, After Update. If(trigger.isinsert && trigger.isafter) { For(Note nt:trigger.new){ Id parentid= nt.parentId; Schema.DescribeSObjectResult sa =parentid.getSObjectType().getDescribe(); if(sa.Name.tolowercase()=='account'){ createfileandfoldersinbox.createdfilesand folderinbox(parentid,nt.id, nt.Title,nt.body,true); }
  • 4. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com 682 IJTSRD | May-Jun 2017 Available Online @www.ijtsrd.com if(sa.Name.tolowercase()=='opportunity' || sa.Name.tolowercase()=='contact'){ createfileandfoldersinbox.createdfilesand folderother(parentid,nt.id, nt.title,nt.body,true); } } } Trigger call the method “createdfilesandfolderother” in the web service “createfileandfoldersinbox” by passing the parameters parented, id, Title, body, Boolean value (true / false). Createfileandfoldersinbox execute asynchronous way by made “Future” callout. Web service call external Utility class “boxaccessandrefereshtoken” to get the access token and assign to the folderid. Folderid= boxaccessandrefereshtoken. boxaccrecordid (parentid, noteid, tittle, body, insertfile); “Boxaccrecordid” method call another utility method called “Boxhalfuserauthenticationcls. Boxhalfuserauthentication” which returns the response as an authorization token. Once generate and submit the public key, you can able to send user OAuth and enterprise token by JWT (JSON Web Token) grant. Each and every JWT assertion have mainly three components namely Header, Claims and the Signature. The header has an algorithm support for JWT signature, Claims contain the information required to authenticate and generate a correct token, Signature searches the application and validated by the public key. The pseudo code of the utility class as follows: String claim_set = '{"iss":"9s9i33f74i3uth9pu6d7lfbfu3sffat6"'; claim_set+=',"sub":"792309226"'; claim_set+=',"box_sub_type":"user"'; claim_set+=',"aud":"https://api.box.com/oauth2/tok en"'; claim_set += ',"jti":"'+jti+'"'; claim_set += ',"exp":'+exptime1+'}'; String claim_set_Encode = EncodingUtil.base64Encode(blob.valueof(claim_set)); String Singature_Encode = Header_Encode+'.'+claim_set_Encode; string key=’private key specified above'; blob privateKey = EncodingUtil.base64Decode(key); Singature_Encode = Singature_Encode.replaceAll('=',''); Httprequest req = new HttpRequest(); HttpResponse res = new HttpResponse(); req.setEndpoint('https://api.box.com/oauth2/token') ; req.setMethod('POST'); req.setHeader('ContentType','application/x-www-form- urlencoded'); String grt = 'urn:ietf:params:oauth:grant-type:jwt-bearer'; List<string> urlParams = new List<string> {'grant_type='+grt, ‘client_id=' + EncodingUtil.urlEncode('9s9i33f74i3uth9pu6d7lfbfu3sffat6 ', 'UTF-8'), 'client_secret=' + EncodingUtil.urlEncode('068tibjjPovMcRr8qXNRhIq8wQKq ZGSu', 'UTF-8'), 'assertion='+JWT}; string body = string. join(urlParams, '&'); system. debug('=====body ======'+body ); req. setBody(body); res = h.send(req); string Response = res.getBody() +' '+ res.getStatusCode(); Finally, the response variable receives key value (Authorization token). CONCLUSION The modern enterprise business following cloud- based paradigm, which offers the shared services, pay and use the mechanism, repository, Infrastructure and working as Platform as well. Modern ECM allows you to maintain enterprise data through the cloud. The SAAS connectivity, data synchronization with ECM is a challenging task in terms of governor limitation. We proposed a novel approach to synchronize SAAS data with ECM with authorization user. The proposed technique provides a public/private key for the user to access ECM content seamlessly. We integrated Salesforce CRM SAAS application with modern ECM called box to evaluate the performance of the proposed solution by implementing custom web services, which outperform than other techniques in terms of speed and reliability.
  • 5. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470 www.ijtsrd.com 683 IJTSRD | May-Jun 2017 Available Online @www.ijtsrd.com REFERENCES 1) Enterprise content management , https://en.wikipedia.org/wiki/Enterprise_content_ management. 2) SharePoint ,detailed information available at https://products.office.com/en-us/sharepoint. 3) Box Cloud storage company, detailed information available at https://www.box.com. 4) Oracle Web center , detailed information available at http://www.oracle.com/technetwork/middleware/ webcenter/suite/overview/index.html. 5) Nuxeo , detailed information available at https://doc.nuxeo.com. 6) Open Text, detailed information available at http://www.opentext.com/. 7) Dell Dcoumentum, detailed information available at http://www.opentext.com/. 8) IBM FileNet p8 , detailed information available at http://www.ibm.com/support/knowledgecenter/SS GLW6. 9) Docushare, detailed information available at https://docushare.com/. 10) On Base, detailed information available at https://www.onbase.com/en/. 11) Laser Fiche, detailed information available at https://www.laserfiche.com/. 12) SpringCM , detailed information available at https://www.springcm.com/. 13) Seismic, detailed information available at https://seismic.com/. 14) Alfresco content services, detailed information available at https://www.alfresco.com/platform/content- services-ecm. 15) Lexmark , detailed information available at https://www.lexmark.com/en_in.html. 16) M-Files, detailed information available at https://www.m-files.com/ 17) Media Bank, detailed information available at https://www.mediabank.me/. 18) Veeva Vault, detailed information available at https://www.veeva.com/products/enterprise- content-management/. 19) Gartner Report http://mediaproducts.gartner.com/reprints/emc/art icle5/article5.html 20) Box enterprise content management https://www.box.com/content-management