Free Essay

Domain Model

In:

Submitted By abien
Words 844
Pages 4
Group Tour Scheduling System

1. Conceptual Class List

|Conceptual Class Name |Source |Identification Technique |Conceptual Class Definition|
| |Document | | |
|1. BooksTheTour |GTSS System Background |Conceptual class category |GTL process of booking |
| |Information |list. |tour. |
|2. CollectsTourPayment |GTSS System Background |Conceptual class category |Transaction for collecting |
| |Information |list. |payment. |
|3. ConcessionsContact |GTSS System Background |Conceptual class category |Process between SGTA and FC|
| |Information |list. |to make arrangements |
|4. ViewCalendar |System Vision |Noun-phrase |Show calendar that records |
| | |identification. |all booked tours. |
|5. SignUpToLeadTours |System Vision |Conceptual class category |Volunteer process for |
| | |list. |signing up for tour to |
| | | |lead. |
|6. TrackFacilities |System Vision |Conceptual class category |FC process of tracking |
| | |list. |reserved rooms. |
|7. AdjustTourDate |Requirements |Conceptual class category |Being able to change or |
| | |list. |adjust tours. |
|8. EmployeeContactInfo |Requirements |Noun-phrase |Requirement of having an |
| | |identification. |employee’s contact |
| | | |information. |
|9. Email |Requirements |Conceptual class category |The system sends email |
| | |list. |notifications after certain|
| | | |actions. |
|10. SystemPopulation |Use Case Model |Noun-phrase |Another requirement to |
| | |identification. |automatically populate the |
| | | |system with a book tour |
| | | |info |
|11.LogInFSS |Use Case Model |Noun-phrase |Accessing the FSS. |
| | |identification. | |
|12. Facility Scheduling System (FSS) |Use Case Model |Conceptual class category |System the user interacts |
| | |list. |with that communicates with|
| | | |GTSS. |
|13. FacilityIssue |Use Case Model |Conceptual class category |Facilities coordinator uses|
| | |list. |to report any issues. |
|14. CCAdminCommunication |Use Case Model |Noun-phrase |Communication between |
| | |identification. |concessions coordinator and|
| | | |tour admin. |
|15. GroupContactGTL |Use Case Model |Noun-phrase |Process that is the reason |
| | |identification. |why a tour is booked. |
|16. FacilityStatus |Use Case Model |Conceptual class category |Indicates when a facility |
| | |list. |is reserved or open. |
|17. Warning |Use Case Model |Noun-phrase |System generates a warning.|
| | |identification. | |
|18. SpecialNeedsAccomodation |System Vision |Noun-phrase |A general requirement to be|
| | |identification. |able to accommodate special|
| | | |needs. |
|19. VirtualCalendar |System Vision |Noun-phrase |Requirement to be able to |
| | |identification. |have access to the calendar|
| | | |on the go. |
|G20. TrackSupplies |System Vision |Noun-phrase |The concessions coordinator|
| | |identification. |wants to keep track of |
| | | |supplies on hand. |
|21. StatusCheck |Requirements |Noun-phrase |Tour administrator wants to|
| | |identification. |know the status of a tour |
| | | |whenever they need to know.|
|22. SendConfirmationNumber |Requirements |Conceptual class category |The SGTL wants the system |
| | |list. |to send a confirmation |
| | | |number to the GTL. |
|23. OnlineScheduleChange |Requirements |Noun-phrase |The tour guides want to be |
| | |identification. |able to change their |
| | | |schedules online. |
|24. VirtualCalender |Use case model |Noun-phrase |FC displays Virtual |
| | |identification. |calendar |
|25. StaffGroupTourAdministrator |System Vision |Conceptual class category |SGTA receives and views |
| | |list. |warning from Notification |
| | | |system |
|26. Message |Use case model |Noun-phrase |GTSS sends message to |
| | |identification. |Notification system |
|27. Facilities |System Vision |Noun-phrase |FC selects facility to |
| | |identification. |report issue |
|28. Notification system |System vision |Conceptual class category |Sends notification to users|
| | |list | |
|29. DateTime |Use case model |Noun-phrase |FC selects DateTime to |
| | |identification. |change facility schedule |
|30. FacilitiesCoordinator |System Vision |Conceptual class category |FC uses the system to |
| | |list. |manage facilities booking |

2. Domain Model Diagram

[pic]
3. Abstraction Analysis Table of used conceptual classes
|Conceptual Class Name |Attributes |Methods |Collaborators |
|Email |Change information, change |Create notification, |NotificationSystem |
| |owner, receiver |send notification | |
|Warning |Warning message, receiver, |Generate warning, send |NotificationSystem |
| |warning origin | | |
|Facility Scheduling System (FSS) |Facilities information, |Collect FC data, send |GroupTourScheduleSystem, FacilityCoordinator |
| |facility calendar, |data to GTSS | |
| |facilities status | | |
|FacilityStatus |Facility ID, FacilityStatus|Examine facility |FacilitiesSchedulingSystem |
| | |status, Display | |
|FacilityIssue |Issue ID, issue |Edit, preview, |FacilitiesCoordinator, NotificationSystem |
| |description, issue owner |send/report | |
|Message |Content |Edit, send |NotificationSystem, Users |
|StaffGroup |Administrator ID, name, |Receive warning, |NotificationSystem |
|TourAdministrator |email address |resolve issue | |
|VirtualCalendar |Tour calendar |Display |MobileUser, MobileDevice |
|DateTime |Facility ID, facility |Change schedule, submit|FacilityCoordinator, FacilitySchedulingSystem |
| |schedule, facility status | | |
|Facilities |Facility ID, facility |Edit issue, Submit |FacilityCoordinator |
| |status, issue description | | |
|NotificationSystem |Message, sender name |Receive notification, |Users, Systems |
| |receiver name, |send notification | |
| |communication tools (email,| | |
| |mobile phone …) | | |
|FacilitiesCoordinator |Employee ID, tour in charge|Receive facilities |FSS |
| | |request, sign in, book | |
| | |facilities, check | |
| | |facilities status | |

4. Abstraction Analysis Table of other conceptual classes

|Conceptual Class Name |Attributes |Methods |Collaborators |
| BooksTheTour |Customer request |Edit, preview, |VisitorServiceResources |
| |(group leader name, |submit |ManagementSystem |
| |tour date, nb of | | |
| |people …) | | |
|CollectsTourPayment |Amount paid, payments |Collect, check, |GroupTourAdmissionSystem, BankInterface (when |
| |means |confirm |credit card) |
|ConcessionsContact |Message, sender name |Edit, send |GroupTourAdministrator, Facility Coordinator |
| |receiver name | | |
|SignUpToLeadTours |Volonteer name, tour |Sign in, register, |Volonteer, StaffVolonteeScheduleSystem |
| |ID |confirm | |
|TrackFacilities |Room ID, room status, |Search, display |FacilityCoordinator, FacilitySchedulingSystem |
| |room description | | |
|AdjustTourDate |Tour ID, tour |Examine changes, |TourLeader, VisitorServiceResources |
| |information, request |apply changes, send |ManagementSystem |
| | |notification | |
|EmployeeContactInfo |Employee name, |Search, display |TourAdministrator |
| |employee contact | | |
|SystemPopulation |Tour information |Check information, |VisitorServiceResources |
| |(group nb, tour ID, |populate the system |ManagementSystem |
| |leader name, | | |
| |requirements) | | |
|LogInFSS |Username, password |Check password, |User |
| | |connect | |
|CCAdminCommunication |Message, sender name |Edit, send |ConcessionCoordinator, TourAdministrator |
| |receiver name | | |
|Warning |Warning message, |Generate warning, |NotificationSystem |
| |receiver, warning |send | |
| |origin | | |
|SpecialNeedsAccomodation |Special need |Edit, preview, send |Users, NotificationSystem |
| |information, sender | | |
| |name, receivers names | | |
|MobileCalendarAccess |Tour calendar |display |MobileUser, MobileDevice |
|TrackSupplies |Supply name, supply |Collect supply |ConcessionCoordinator, |
| |information, expected |information, display|ConcessionManagementSystem |
| |delivery date | | |
|StatusCheck |Tour ID, Tour status, |Collect tour |TourAdministrator |
| |Tour information |information, display| |
|SendConfirmationNumber |Confirmation number, |Generate message, |NotificationSystem, GroupTourLeader |
| |Confirmation message |Generate | |
| | |confirmation number | |
| | |send | |
|OnlineScheduleChange |Staff Schedule, change|Load schedule, edit |StaffVolonteeScheduleSystem, Staff |
| |form |change, sibmit | |

Similar Documents

Free Essay

Creating a Domain Model

...Creating a Domain Model Option 1 POS/421 – Windows Server Networking University of Phoenix Robert Singer The hierarchical naming system for computers, known as the Domain Name System (DNS), in any source linked to the Internet or private network. This system connects diverse information with domain names assigned to each of the participants. More importantly, it communicates the domain names that humans understand into numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.  An analogy used often to explain the Domain Name System is that it is like a phone book for the Internet. It translates language a human can understand to computer hostnames into IP addresses. For instance, www.example.com changes to 192.0.32.10. DNS known also as a distributed database that offers mapping between IP addresses and Host names.           Using the Domain Name System it is likely to assign domain names to sets of Internet users in an important way, free of each user's actual physical location. Since this is possible, World Wide Web (WWW) hyperlinks and Internet contact information will stay dependable and unbroken even if the existing Internet routing arrangements become altered or change, or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 209.75.188.166 (IPv4) or 2001:db8::1f70:6e8 (IPv6). Individuals take use this advantage when they talk about...

Words: 502 - Pages: 3

Free Essay

Cis 510 Week 7 Assignment 3

...A++PAPER;http://www.homeworkproviders.com/shop/cis-510-week-7-assignment-3/ CIS 510 WEEK 7 ASSIGNMENT 3 CIS 510 Week 7 Assignment 3, CIS 510 Week 7 Assignment 3 – Strayer Assignment 3: Creating a Domain Model Class Diagram Due Week 7 and worth 150 points Refer to the RMO CSMS domain model class diagram shown in Figure 4-23 on page 111 of the textbook and the discussion of subsystems in Chapter 3. Write a two to three (2-3) page paper in which you: Using Microsoft Visio or an open source alternative such as Dia, create a domain model class diagram for the RMO CSMS marketing subsystem. Note: The graphically depicted solution is not included in the required page length. Provide a narrative describing your diagram that includes: An overview of the diagram An analysis of the different classes in the diagram Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required...

Words: 322 - Pages: 2

Free Essay

Research

...Laboratory Exercise No 1 | Introduction to Application Domain Modelling | | 1. Objective(s): | The activity aims to develop their design and concept skills using application domain model using: * information input and formatting * effective layout using different tools available in Adobe Photoshop | 2. Intended Learning Outcomes (ILOs): | The students shall be able to: * Examine Adobe Photoshop and manipulate colour schemes. 2.2 Insert and manipulate shapes and graphics | 3. Discussion: | There are different types of application domain models and can be distinguished according to the objective of the model. There are many types of projects that doesn’t have any particular requirement, the used of a good user interface will bridge between man and machine. It is a translator that both the user and the computer can understand. The extreme differences in the way people think and the way computers operate dictate the need for well-designed user interfaces. Productivity is often proportional to the quality of the user interface and time is wasted when communication deteriorates.Sections of Application DomainBiologyBookmarksBusiness/StocksComputer SystemsDemographicsGeographicsGovernment/PoliticsKnowledge NetworksNewsRepresentationsSocial NetworksTransportation NetworksWorld Wide Web. | 4. Resources: | Adobe Photoshop Software CS5 | 5. Procedure: | Explore and use the basic functionality /features of Photoshop in relation to graphics...

Words: 482 - Pages: 2

Premium Essay

Anwar And Leah Case Study

...1. Anwar and Leah are concerned about protecting the funds in their estate after it is passed to their children. They have tried to structure their wills in as optimal a manner as possible, but their advisor has told them that once the children receive the funds, it is up to the children to take certain steps in order to protect the funds into the future. Explain some of the steps that their children (i.e. not Anwar or Leah) could do to help protect their inheritances. 5 MARKS (5 marks) Anwar and Leah, in order to protect the funds in your estate after it is passed onto your children David, Amal and Lisa. There are many steps we can take. However, it is not always possible to protect assets from claims by a former spouse or partner, especially since we are in a society where the statistics show that 50% of all marriages will end with a divorce. There are a few precautions your children can take to protect their inheritances. In David's instance since he is currently the only one married and without a marriage contract, if he wants all inheritances to remain exempt from his current spouse, he would need to discuss with his wife about setting up a marriage contract. This could be a difficult conversation to have and may put a strain on the relationship between David and his wife. She would have to agree on setting up a marriage contract and agree to the terms of being excluded from his inheritances from his parents. A marriage contract is a legal document that discloses all...

Words: 729 - Pages: 3

Free Essay

Distributed Systems

...In a Distributed model, each site is self-sustained for the most part. While some connectivity to the primary datacenter is required, the remote site would host its own Email Server, manage its own backups, control its own Internet access, and host its own Shared Files. Application access may still rely on HQ, although many applications support this type of distributed model. The benefit of a Distributed model is that each site can ‘survive’ on its own. There is no Single Point of Failure in this regard. Also, assuming that the hardware in some of the sites is stored in a secure Server Room, this also would potentially facilitate Business Continuity by utilizing Sites that reference each other as contingency Sites. When designing distributed systems it is said that the following assumptions should be considered false: 1. The network is reliable. 2. Latency is zero. 3. Bandwidth is infinite. 4. The network is secure. 5. Topology doesn’t change. 6. There is one administrator. 7. Transport cost is zero. 8. The network is homogeneous By challenging each of these assumptions and looking at the system design within that context it can help identify potential risk areas. Systems that exhibit the key principles, like reliability and availability, have designs that take each of these fallacies into consideration. When it comes to failures, most fall into one of two buckets: hardware or software related. Hardware failures used to be more common, but...

Words: 931 - Pages: 4

Free Essay

What Are Functional Levels Designed to Do?

...levels determine the available Active Directory Domain Services (AD DS) domain or forest capabilities. They also determine which Windows Server operating systems you can run on domain controllers in the domain or forest. However, functional levels do not affect which operating systems you can run on workstations and member servers that are joined to the domain or forest. What are the DNS requirements to install active directory? When you install Active Directory on a member server, the member server is promoted to a domain controller. Active Directory uses DNS as the location mechanism for domain controllers, enabling computers on the network to obtain IP addresses of domain controllers. During the installation of Active Directory, the service (SRV) and address (A) resource records are dynamically registered in DNS, which are necessary for the successful functionality of the domain controller locator (Locator) mechanism. What are trust relationships and how are they used? In the Windows NT domain model, domains had to be bound together through trust relationships simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain. Defining trust relationships between domains eliminates the need for an Administrator to configure user accounts in multiple domains. What are the FSMO role defaults, how many there...

Words: 2607 - Pages: 11

Premium Essay

Copyright Cases in Us

...material. License cannot extend holder's rights beyond statute defined by Congress. | Bauer & Cie. v. O'Donnell | 229 U.S. 1 | 1913 | Differences between patent and copyright defined also prohibits a license from extending holder's rights beyond statute. | Macmillan Co. v. King | 223 F. 862 | D.Mass. 1914 | Limits of fair use with respect to an educational context and to summaries. | Nichols v. Universal Pictures Co. | 45 F.2d 119 | 2d Cir. 1930 | No copyright for "stock characters". | Shostakovich v. Twentieth Century-Fox Film Corp. | 196 Misc. 67, 80 N.Y.S.2d 575 (N.Y. Sup. Ct. 1948), aff'd 275 A.D. 692, 87 N.Y.S.2d 430 (1949) | 1948–9 | No moral rights in public domain works. | Alfred Bell & Co. v. Catalda Fine Arts, Inc. | 191 F.2d 99 | 2d. Cir. 1951 | Variations of works in the public domain can be copyrighted if the new "author" contributed something more than a "merely trivial" variation, but no large measure of novelty is necessary. | National Comics Publications v. Fawcett Publications | 191 F.2d 594 (1951), clarified 198 F.2d 927 (1952) | 2d Cir. 1951–2 | Derivative works; an author does not forfeit his copyright to a piece of intellectual property if his work is...

Words: 1946 - Pages: 8

Free Essay

Uml Term Papaer on Domain Analysis

...LOVELY PROFESSIONAL UNIVERSITY TERM PAPER ON Extending UML to Support Domain Analysis SUBMITTED TO:- SUBMITTED BY:- Mr. SANDEEP SINGH AKANSHU KUMAR Reg No:-11112286 ROLL No:- A21 SECTION:- K1107 Abstract:- The process of modelling and developing commonality and variability for system families should be supported by suitable methods and notations. The object-oriented methods and their notations, which are used at present, focus on the development of a single system at a time. In this paper we analyse feature models as a representation of the common parts and variants contained in a system family, and propose using a feature diagram as a basic representation of commonality, variability and dependencies. We examine various approaches to customizing the standard modelling language UML to model system families and propose how to extend the UML for the purposes of modelling variants in object-oriented analysis and design techniques. We recommend the use of UML standard lightweight extensibility mechanisms (stereotypes combined with tagged values) without changing the UML metamodel. This enables us to join the advantages of feature models with UML and provides the traceability of a concept throughout system...

Words: 3255 - Pages: 14

Free Essay

Model Based Testing

...MODEL BASED TESTING Manoj Philip Mathen manoj.mathen@outlook.com Abstract: This paper is a quick glance into what is Model Based Testing, its evolution, its current state, who should use it, the techniques and tools involved and what will it mean to the enterprise in terms of the cost incurred. The paper starts with a brief exploration into some of the building blocks of MBT, followed by an attempt to define Model based Testing. This is followed by an argument on the need of Model Based Testing, and a quick overview on Model Based Testing and the approach. Next, we walkthrough 2 example scenarios, where certain models have been exhibited to showcase testing benefits. This also shows the different techniques and methods in MBT. Finally the author describes some common challenges in Model based Testing and some best practices. Introduction Model Based Testing (MBT) is very common in validating embedded systems, phones, switches etc. The model based testing was very successful and has yielded good results in these areas. This could have been the reason why practioners tried exploring the feasibility of the same in other areas of Software validation...

Words: 2784 - Pages: 12

Premium Essay

Starting a Business Online

...Assignment 2: Starting a Business Online, Part 2 Janice Monroe Notre Dame University May, 31, 2013   The Jersey Shore Clothing Company has been online a month and we have been offered the opportunity to sell our domain name to a competitor for $1000. It is a tempting offer. With that being said we are just starting to become established as a web presence, and business has been steady. It is possible our competitor could use a different version of our domain name and redirect traffic that would come to our site to their site. The predicament of our competitor utilizing a similar site does not prevail over the fact that our established clients are already using our existing domain, and the amount of resources we put into the advertising using our domain name. Ethically speaking we do not have a copyright on the name “Jersey Shore” ergo anyone is at liberty to utilize the name as they see fit. We feel it is in the overall best interest of the business and our investments to not sell our domain name at this time. We are just becoming established and do not want to deter any of the customer relationships that we have formed since going live online. (Fitzpatrick, 2013) We have decided to continue using the Big Commerce® software as the backbone to our online store. (http://www.bigcommerce.com/). We are looking to work to continue improvements with the shopping cart capabilities on our site. Our online catalog will feature a bold new look as we offer our...

Words: 1432 - Pages: 6

Premium Essay

Domain Tasting Problem in 2003 and the Solution

...institute with the goal of designing a worldwide network that could remain operational even the network were sabotage by the military enemy. The researchers were determined the best solution to accomplishing their goal was to create networks that do not require a central computer control network operations. However, at the time the only network existed was a single connection between sender and receiver from the leased telephone company line. There was a concerned of risk using single connection method for connecting computers, so the researchers developed a different method in communication using multiple channels. In 1969 the Department of Defense researchers in the Advanced Research Projects Agency (ARPA) use this direct connection network model to connect four computers; one each at University of California at Los Angeles, SRI International, University of California at Santa Barbara, and the University of Utah into the network called the ARPANET. The integration of these four computers was the first networks to become what we now call the internet. In the 80’s as computers became more powerful, affordable and available, businesses increasingly used them to construct their own internal networks. The National Science Foundation (NSF), who funded...

Words: 661 - Pages: 3

Premium Essay

Journal of Macromarketing

...2012 Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0276146712463823 jmk.sagepub.com Blaine J. Branchik1 and Tilottama Ghosh Chowdhury1 Abstract This research chronicles the changes in the understudied and rapidly evolving male market segment using two related studies: (1) a content analysis of advertisements in fifty-one years of Sports Illustrated magazine and (2) an experiment involving age-based differences in consumer ad perceptions. Both investigate changing ad values and the ethnic diversity of ad models. Results indicate that the male market is becoming increasingly self-oriented in its values orientation as a result of broad societal changes and changing gender roles. Increasing use of black or African American models in key positions indicates a growing acceptance of minorities as representations of the ideal self among younger men, who express a preference for black or African American models. This finding speaks to the increasingly multicultural nature of society and the impact of minority celebrities on American culture. The results are indicative of the power of advertising in both reflecting and facilitating societal change. Keywords advertising, male market, societal change, ethnicity, gender, culture, macromarketing Introduction American men, as a cultural entity and market force, are undergoing rapid change. This metamorphosis is reflected in men’s increasing focus on their bodies (Alexander 2003; Pope, Phillips...

Words: 10179 - Pages: 41

Premium Essay

Windows Network Proposal

...and trademarks are at stake. Los Angeles sales personnel will need secure remote access to Houston office. The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place. Feel free to make other assumptions but they need to be noted in the paper. Topic to Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. The topics include: -Active Directory: What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration? FSMO Roles placement Plan for AD backup and recovery -Group Policy: Is Group Policy needed? What settings might be considered via Group Policy? -DNS: What namespace should Shiv LLC implement? What types of zones needed? -File Services: How will the shares be secured? Will quotas be used? FSRM be configured? Will DFS be implemented? -Remote Services: What technology will be implemented to provide secure remote access for users? Who should have remote access? -WSUS: How...

Words: 547 - Pages: 3

Premium Essay

Copyrighting

...I. Introduction The Copyright Law Copyright is the exclusive right, to an intellectual property of any person, including elements of authorship, musical, literary, architectural, pictorial, choreographic, pantomimic, graphic, sculptural, and cartographic creations to print, publish or sell copies of his or her original work. Copyright is a law that protects published and unpublished work that you can see, hear and touch, from being reproduced without prior consent from the creator of the work. The copyright law was designed to strike a balance between the needs of consumers and those of creators. The issue is a control over piracy. Piracy has not disappeared, nor, by many measures, has it lessened. However, the success or failure of this act depends entirely on who you talk to. The debate is most often cast as a consumer issue, so both sides are looking for your (the consumer’s) ears. Strong arguments exist from either perspective, but both sides agree there have been unintended consequences to the provisions of the Copyright law. II. What is a Copyright? A Copyright is a form of protection provided by the laws of the United States (title 17, U.S. Code) to the authors of original works including literary works, movies, musical works, sound recordings, paintings, photographs, software, live performances, and television or sound broadcasts. This protection is available to both published and unpublished works. The Copyright Act generally gives the owner of copyright the...

Words: 3788 - Pages: 16

Free Essay

Smash: Secure Cross-Domain Mashups on Unmodified Browsers

...SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, Sachiko Yoshihama {eb41704, sachikoy}@jp.ibm.com, {sbhola, msteiner, schari}@us.ibm.com IBM Tokyo Research Laboratory, Kanagawa, Japan; IBM T.J. Watson Research Center, New York, USA ABSTRACT Mashup applications mix and merge content (data and code) from multiple content providers in a user’s browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical. The technology discussed in this paper allows mutually mistrusting client-side components to communicate safely without any modifications to current browsers, and hence has the potential to achieve immediate and widespread adoption. Categories and Subject Descriptors: D.2.0 [General]: Protection...

Words: 10150 - Pages: 41