Social Interaction With Software Connectors and the Function of Facade Component in Secure Application Logic

Social Interaction With Software Connectors and the Function of Facade Component in Secure Application Logic

Faisal Nabi
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJSI.301230
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The paper represents a conceptual study of the social interaction model of ATMs by using integration in a UML model-based design for software architecture that deals with the secure component-based software protection and communication patterns through facade based connector. The facade-based connector is developed separately from software components by using the correct contact pattern between components and the required security patterns that encapsulate the connection with other secure connectors. Each secure connector consists of both security architecture and contact patterns. It is constructed as a composite component even though connectors are usually used by component-based software development to encapsulate the mechanisms of communication with components. This paper addresses the security and privacy issues related to social interaction with the ATM model that may also be encapsulated in the software application logic through a secure facade based connector that is known as a security in a connector based social e-commerce B2c application
Article Preview
Top

1. Introduction

Modern life is far more complex than any other kind of social order, and is primarily aimed at achieving individual objectives, thus fragmenting the social order and reducing the interaction that comes with social contact. Consequently, people rely on social media (e.g. email, social media and video conferencing) to maintain contact and with the passage of time, social e-commerce is also being used, such as social interaction with theATM banking model. This model has enabled a new era of shifting from traditional e-commerce to social e-commerce and Banking industries have adopted this model. This refers to human social interaction (Siricharoen 2019). However, the security of HCI related to social interaction is a very important issue requiring discussion among the research community. One example is social interaction using the ATM Banking security model.

In modern era of software, the component-based software development method is widely used, especially in the distributed social e-commerce system, which has developed through components. Such systems or applications encapsulate the functionality of the business logic process. Apart from that, components also need connectors, which encapsulate the inter-communication of component process (Albassam et al. 2017). The UML 2 provides notation for modelling the component ports that are provided and the necessary interfaces in CBSAs asynchronous communication or synchronous replication communication. The connector’s role within the component-based application is that of a glue that encapsulates the inter-communication mechanisms to perform the functionality that supports the application logic. This provides a major role in component based applications because some components within an application are without offered or required interfaces that need connector support to glue the connection in between the component interaction within the application.

Current approaches for component-based development of social e-commerce often ignore the secure integration process designed by the security concept. There are currently two main methods for component integration. These current methods appear to use a composition process that falls into two main categories: (a) transmitting the message directly; (b) transferring the message indirectly. In these two methods, interaction of components is based directly on inter-communication which corresponds to the direct method call, performing two distinctive roles, both sender and recipient of a message. In this case, the recipient's identity is either known to the sender statically or evaluated dynamically during the execution time.

The direct message transmission method calls for a component that is tightly coupled, in which there is no need of any glue code or connector as shown in figure 1 (a). On the other hand, indirect message transmission connectors are exemplified as separate entities that are defined clearly in the component composition. They are usually glue codes or scripts, which pass messages indirectly between components. To make a connection from one component to another component, a connector provides the link, which provides a method to be notified by the former. In general, the data flow associated with the composition is isolated from the computation in the individual component, when the components are linked through the indirect message transfer figure 1 (b). This figure clearly illustrates that components do not directly call each other but connectors are called in the system method process during the loosely coupled application logic (Albassam et al.2017).

Figure 1.

Direct and Indirect component inter-communication model

IJSI.301230.f01

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing