Final Documentation Overview
Final Documentation Overview
CHAPTER PAGENO
ListofFigures I
ListofTables II
Abstract III
1. INTRODUCTION 1 -3
1.1 Introduction 1
1.2 ProblemDefination 2
1.3 ProblemDescription 3
1.4 ProposedSolution 4
2. LITERATURESURVEY 4-6
2.1 Introduction
3. SYSTEMANALYSIS 7 -19
3.1 RequirementAnalysis 7
3.2 ExistingSystem 8
3.2.1Disadvantages 8
3.3 ProposedSystem 8
3.3.1Advantages 8
3.4 FeasibilityStudy 9
3.5 RequirementSpecifications 9
5. IMPLENTATION 39– 56
6. TESTING 58 – 66
References 76-78
LIST OF FIGURES
14
1 3.6.1 Client-Server Architecture
16
2 3.6.2. Remote Server
I
Sl No Table No Table Name Page No
1. 6.7.1 Admin 63
2. 6.7.2 User 63
3. 6.7.3 Registration 64
II
ONLINE BOOKS REFERENCE
ABSTRACT
A reference work is a book or periodical (or electronic equivalent) to which one can refer for information.
The information is intended to be found quickly when needed. Reference works are usually referred to for
particular pieces of information, rather than read beginning to end. The writing style used in these works is
informative. Many reference works are compiled by a team of contributors whose work is coordinated by one
or more editors rather than by an individual author. Indices are commonly provided in many types of reference
work.
In comparison, a reference book or reference-only book in a library is one that may only be used in the library
and may not be borrowed from the library. Many such books are reference works (in the first sense), which
are, usually, used briefly or photocopied from, and therefore, do not need to be borrowed. Keeping reference
books in the library assures that they will always be available for use on demand. Some reference-only books
are too valuable to permit borrowers to take them out. Some libraries consist entirely, or to a large extent, of
books which may not be borrowed.
A reference work is useful to its users if they attribute some degree of trust.
III
Introduction
CHAPTER 1
INTRODUCTION
1.1 Introduction
Users can clarify their doubts from this site as there is a forum session where
one user who a doubt can ask and the other users who know the answers can
give the reply them with appropriate answer.
1.1 PROBLEMDEFINITION
The main aim of the project entitled “ONLINE BOOKS REFERENCE” is a website which
provides books for the competitive exams. This project is developed with five layers, which
are:
Security
User details
Exam details
Books detail
Model papers
1.2 PROPOSEDSOLUTION
Introduction
A social networking service is an online service, platform, or site that focuses on
facilitating the building of social networks or social relations among people who, for
example, share interests, activities, backgrounds, or real-life connections. A social
network service consists of a representation of each user (often a profile), his/her
social links and a variety of additional services. Most social network services are web
based and provide means for users to interact over the Internet, such as e-mail and
instant message. Our prototype application enables multiple associated users to
specify their authorization policies and privacy preferences to co-control a shared data
item.
A multiparty access control model was formulated, along with a multiparty
policy specification scheme and corresponding policy evolutionmechanism.
The proposed system shows a novel solution for collaborative management of
shared data inOSN’s
A flexible access control mechanism in a multi-user environment like OSN’s
should allow multiple controllers, who are associated with the shared data, to
specify access controlpolicies.
In addition to the owner of data, other controller, including the contributor,
stakeholder and disseminator of data, regulate the access of shareddata.
CHAPTER 3
SYSTEM ANALYSIS
HARDWARE REQUIREMENTS
RAM : 1 GB(min)
HardDiskCapacity : 40 GB(min)
Monitor : AnyMonitor
Keyboard : StandardKeyboard
SOFTWARE REQUIREMENTS
ScriptingLanguage : PHP
Database : MYSQL
WebServer : Apacheserver
3.2 EXISTINGSYSTEM
The existing work could model and analyze access control requirements with
respect to collaborative authorization management of shared data in OSNs. The need
of joint management for data sharing, especially photo sharing, in OSNs has been
recognized by the recent work provided a solution for collective privacy management
in OSNs. Their work considered access control policies of a content that is co-owned
by multiple users in an OSN, such that each co-owner may separately specify her/his
own privacy preference for the shared content.
3.5 REQUIREMENTSPECIFICATIONS
We discuss each class of requirements separately and link them with the specific
characteristics of community-centered collaborative systems.
PHP
PHP, one of the Web’s most popular programming languages. According to
Net craft PHP was running on more than 20 million Web servers in July 2007. At the
time of writing, it is the fourth most popular programming language in the world
according to TIOBE beaten only by Java, C, and C++. With the introduction of
version 5.3, there’s never been a better time to learn [Link] is a programming
language for building dynamic, interactive Web sites. As a general rule, PHP
programs run on a Web server, and serve Web pages to visitors on request. One of the
key features of PHP is that you can embed PHP code within HTML Web pages,
making it very easy for you to create dynamic content quickly. What exactly does the
phrase “dynamic, interactive Web sites” mean? A dynamic Web page is a page whose
contents can change automatically each time the page is viewed. Contrast this with a
static Web page, such as a simple HTML file, which looks the same each time it’s
displayed Mean while, an interactive Web site is a site that responds to input from its
visitors. A Web forum is a good example users can post new messages to the forum,
which are then displayed on the site for all to see. Another simple example is a
“contact us” form, where visitors interact with the page by filling out and sending a
form, which is then emailed to the Webmaster.
FEATURES OF PHP:
• Simple
• Secure
• Portable
SIMPLE:
It is simple for professional programmer to learn & they can use it effectively.
If we already know structure oriented programming, then learning php is very easy.
SECURE:
As we know many people are affected by viral infection when they download
an executable file or program. Rather than, virus programs we have malicious
programs that can gather private information, such as credit card number, bank
account balances & passwords by searching the contents of your computers local file
system.
PORTABLE:
• Database.
• Hardware.
• Software.
• User.
Hardware: The processor(s) and associated main memory that are used to support
the execution of database systemsoftware.
Software: The layer between the physical database and the users that handles all
requests from the user for access to the database.
• ApplicationProgrammers
• EndUser
• Database Administrator(DBA)
TYPES OF DBMS:
• Hierarchical
• Network
• Inverted
• Relational
RELATIONAL DATABASE MANAGEMENT SYSTEMS
Database Management System has evolved from hierarchical to network to
relational models. Today, the most widely accepted database model is the relational
model. The relational database management system uses only its relational
capabilities to manage the information stored in the database. The relational model
has three differentaspects.
• Structures.
• Operation.
• Integrityrules.
STRUCTURES:
They are well-defined objects that store the data of a database structure and
the data contained within them can be manipulated byoperations.
OPERATIONS:
They are clearly defined actions that allow users to manipulate the data and
structures of a database. The operations on a database must adhere to a predefined set
of integrity rules.
ARCHITECTURE:
The server platform runs on an operating system, naturally, and on that runs
the web server and the database system, MySQL. For us, the web server is
programmed in PHP, and I’ll give my reasons why that’s almost always my choice,
and that of lots of other people, too.
All of my examples will be for UNIX-like operating systems and Apache, and
I’ll make sure I’m clear about that when it matters. So, in essence, it’s the MP part of
LAMP (Linux, Apache, Mysql and Php) that we care about, with P standing for PHP.
Some 99% of everything in Server Operating System
3. API (application program interface) differences that affect a few PHP functions.
They’re clearly noted in the PHPdocumentation.
4. Command lines executed from a PHP program or directly from the shell or
commandprocessor.
Windows accepts forward slashes in paths in most PHP functions, but you
might get a backslash in a path supplied by a user interactively or when you read one
from a file. I usually convert backslashes to forward ones whenever I input a path on
Windows. Native However, both formats are common on both systems, so this isn’t
really a I’ve dealt with Mac OS and Windows differences a lot in my native
applications that run on those systems, but never in my PHP/MySQL applications,
because I’ve managed to avoid ever running on a Windows server. Your life may not
be so simple, however.
If you get commercial web hosting from one of the numerous commercial
shared-hosting companies, they’re almost always going to use Linux or BSD, with
Windows sometimes being an extra-cost option. Stick with the cheaper Linux or BSD
hosting.
Web Server You’ll almost always use Apache as the web server on systems
and IIS on Window systems, although Apache also runs on Windows.
Apache configuration is hard to learn, but there are two saving graces for
PHP/Mysql programmers. You rarely have to do much with Apache directly, aside
from occasionally editing file to establish options for a directory. Apache is so widely
used that if you Google whatever issue you’re wrestling with, you’ll usually Usability
issues aside, Apache is efficient, reliable, cheap, well-documented, and ubiquitous, so
it’s my web server of choice, by a wide margin. Your primary interface with Apache
is with the file system that it uses. Every web site has a document root on the server,
and your PHP files need to go under that root directory, or in a subdirectory ofit.
If I copy the file [Link] to that directory with an FTP utility, I can run that
PHP program from a browser by requesting the URL. I usually run lots of
applications on my web site, so I put them in subdirectories under the document root,
and then direct users to a URL with a path after the domain name. For example, my
site Classic Cameras is located e-mail, and my customer doesn’t really care about the
cosmetics of theURL.
Database System There are lots of SQL database systems out there for web
applications, and I’ve used all the major ones, including Microsoft SQL Server,
Oracle, IBM DB2, Postgre SQL, and, of course, MySQL. The first three are excellent
commercial systems. PostgreSQL is an open source system, with origins much older
than MySQL, but it’s less widely used than MySQL, although many hosting
companies offer it as an option.
In the past, MySQL supported such a limited form of SQL that it was
annoying to use for a database professional spoiled by a more complete system like
Oracle or PostgreSQL. But recent versions have changed that, and I now find that it
has everything I want except for check conditions. My reason for preferring MySQL
is simply that I find life easier if I use just one set of platform technologies, and
because MySQL is always there and works extremely well, it’s always my first
choice.
Sun Microsystems bought MySQL in 2008, and Oracle bought Sun about two
years later, so now, somewhat ironically, Oracle owns MySQL. Despite some concern
that Oracle might neglect MySQL development and/or support in order not to
cannibalize Oracle sales, it hasn’t done so, and MySQL remains just as viable as ever.
Nonetheless,
Two processes (or tasks) are of concern on the server: the database (MySQL, for us)
and the web server (usually Apache or Microsoft IIS). The PHP processor runs under
control of the web server and executes the PHP files that compose the application.
The four labels in the server box correspond to the elements of the so-called LAMP
stack: operating system (Linux), web server (Apache), database (MySQL), and
language (PHP). As I’ll explain, the first doesn’t have to be Linux and the second
doesn’t have to be Apache. Generally, the last two don’t have to be MySQL and PHP,
but they are in this book, since that’s ourfocus.
PHP is always there. I’ve never found a hosting company that didn’t offer it.
Java is sometimes an extra-cost option, if it’s available at all, and Python and Ruby
are often unavailable. PERL is as common as PHP, but it’s an even worse language.
It’s fast. It’s so widely used that there’s lots of optimization for it, especially when
used withApache.
So, the answer to why PHP, since I can and have used almost every language
that ever existed, is that it’s pleasant enough to use, always available, extremely well
supported, and nearly always has a function to There are three other languages you’ll
be using, as web application developers always use at least four languages.
• HTML (includingCSS),
• JavaScript,and
• SQL, to talk to thedatabase.
HTML and JavaScript run in the browser; never on the server. SQL is passed
to the database from your PHP program, or sometimes used directly on the database,
so it’s a server language.
Design is the first step in moving from problem domain to the solution
domain. Design is essentially the bridge between requirements specification and the
finalsolution.
CSS:
CSS Stands for "Cascading Style Sheet." Cascading style sheets are used to
format the layout of Web pages. They can be used to define text styles, table sizes,
and other aspects of Web pages that previously could only be defined in a page's
HTML. The basic purpose of CSS is to separate the content of a web document
(written in any mark up language) from its presentation (that is written using
Cascading Style Sheets). There are lots of benefits that one can extract through CSS
like improved content accessibility, betterflexibility.
JAVA SCRIPT
JavaScript is considered to be one of the most famous scripting languages of
all time. JavaScript, by definition, is a Scripting Language of the World Wide Web.
The main usage of JavaScript is to add various Web functionalities, Web form
validations, browser detections, creation of cookies and so on. JavaScript is one of the
most popular scripting languages and that is why it is supported by almost all web
browsers available today like Firefox,
SQL
SQL stands for Structured Query Language. SQL lets us access and
manipulate databases. SQL is an ANSI (American National Standards Institute)
standard. SQL can execute queries against a database ,retrieve data from a database,
insert records in a database, update records in a database, delete records from a
database, create new databases , create new tables in a database , create stored
procedures in a database, create views in a database, set permissions on tables,
procedures, andviews.
Functional Requirements:
SYSTEM DESIGN
Admin:
Admin can provide protection to the other user from the spamusers.
Admin can add a new admin. Admin can post and view the advertisements
Privacy concerns over data associated with multiple users and can view the
feedback of users and have control over the website. Here any change can be
made by the admin only. Leverage the features of existing logic solvers to
perform various analysis tasks and manage all users. Admin can manage new
groups and can post new events happening around him related to the society.
She/he can manage the messages send by the user and can manage the users
profile.
User:
Data associated with multiple users. The user can search for new friends and
can view the list of their friends and if any other user sends requests to him /her that
can be visible here. User can update their [Link] user can see the posts made by
the other users It allows users to share personal and public information and make
social connection with friends co-workers-colleagues ,family and even with strangers.
the user can view the advertisements posted by theusers.
4.2 DATADESIGN
Tabledescription:
Fig4.2.1: admin
4.2.2 Advertisementstable
Fig4.2.2: advertisements
4.2.3 Albumstable
Fig4.2.3 albums
4.2.4 Commentstable
Fig4.2.4 comments
4.2.5 Eventstable
Fig4.2.5: events
4.2.6 Friendstable
Table description: This table contains information about the user’s friend list and
status of the friend request.
Fig4.2.6: friends
4.2.7 Group memberstable
Table description: This table contains the related information about the groups
which are created by the user and if any user joins the group the related information
about the user will be saved in this table.
4.2.8 Groupstable
Table description: The user creates the groups and also knows information
about the Group description.
Fig4.2.8: groups
4.2.9 Imagestable
Table description: This table contains the images post by the user according to
their user id.
Fig4.2.9: images
4.2.10 likestable
Table description: This table contains the likes of the user for the posted by the
other user.
Fig4.2.10: likes
4.2.11 Messagestable
Table description: This table contains the messages between one user and
another user. The messages will be saved according to their user ids.
Fig4.2.11: message
4.2.12 Profiletable
Fig4.2.12: profile
4.2.13 videostable
Table description: This table contains the videos which are posted by the users
and these videos are saved in directory according to their corresponding user id’s.
Fig4.2.13: videos
Table description: This table contains the post details which are posted by the
users according to their user id’s.
Fig4.2.14: wallpost
4.3 UMLDIAGRAMS:
UML stands for Unified Modelling Language are a third generation method
for specifying, visualizing and documenting the artefacts of an object oriented system
under development. Object modelling is the process by which the logical objects in
the real world (problem space) are represented (mapped) by the actual objects in the
program (logical or a mini world). This visual representation of the objects, their
relationships and their structures is for the ease of understanding. This is a step while
developing any product afteranalysis.
The goal from this is to produce a model of the entities involved in the project
which later need to be built. The representations of the entities that are to be used in
the product being developed need to be designed. Software design is a process that
gradually changes as various new, better and more complete methods with a broader
understanding of the whole problem in general come into existence.
a) Use casediagrams
b) Classdiagrams
c) Sequencediagrams
d) Collaborationdiagrams
e) Activitydiagrams
4.3.1 CLASSDIAGRAM
4.3.2 USECASEDIAGRAMS
Use cases describe the interactions that take place between actors and IT systems
during the execution of business processes:
A use case represents a part of the functionality of the IT system and enables the user.
Functionalities that exist in the IT system, but that are not accessed by means of use
cases, are not available to users. Even though the idea behind use cases is to describe
interactions, flows of batch processing, which generally do not include interactions,
can also be described as use cases. The actor of such a batch use case is then the one
who initiates batch processing.
Relationships:
Home page
Profile page
Blog page
4.3.3 SEQUENCEDIAGRAM
User
Admin
A data flow diagram is graphical tool used to describe and analyze movement
of data through a system. These are the central tool and the basis from which the
other components are developed. The transformation of data from input to output,
through processed, may be described logically and independently of physical
components associated with the system. These are known as the logical data flow
diagrams. The physical data flow diagrams show the actual implements and
movement of data between people, departments andworkstations.
IMPLEMENTATION
SYSTEM ARCHITECTURE
user, or where the user was tagged. Once information is imported, the user accesses
MControllerthrough its application page privacy for photos that s/he is a controller, or
view photos s/he is allowed to access. A core component of MControlleris the
decision making module, which processes access requests and returns responses for
the requests. To evaluate an access request, the policies of each controller of the
targeted content are enforced first to generate a decision for the controller. Then, the
decisions of all controllers are aggregated to yield a final decision as the response of
the request. Multiparty privacy conflicts are resolved based on the configured conflict
resolution mechanism when aggregating the decisions of controllers. privacy setting,
a corresponding feedback is provided to indicate the potential authorization impact of
her/his choice. The controller can immediately determine how many users can see the
photo and should be denied, and how many users cannot see the photo and should be
allowed. MController can also display the details of all users who violate against the
controller’s privacy setting (See Figure 7 (d)). The purpose of such feedback
information is to guide the controller to evaluate the impact of collaborative
authorization. If the controller is not satisfied with the current privacy control, s/he
may adjust her/his privacy setting, contact the owner of the photo
on Facebook, where she/he can access queryinformation.
[Link]
<? Php
header("Location: [Link]");
include ("[Link]");
?>
<? Php
if($_POST [setid]==$_SESSION[setid])
if (isset($_POST["signup"]))
if (mysqli_num_rows ($sqllogin) == 0)
if (!mysqli_query($con,$sql))
else
else
?>
<script type="application/javascript">
</script>
<?php
if(isset($_POST["submitlogin"]))
if(mysqli_num_rows($sqllogin) == 1)
else
{
$msglogin = "<br><font colour='red'>Failed to login..</font>";
if(isset($_POST["btnresetpassword"]))
if(!$sqllogin)
else
include ("[Link]");
?>
<div id="container">
<!--
#####################################################################
########################### -->
<div class="push30"><imgsrc="images/snal/six_figure_mentors_mission.jpg"
alt="" width="1200" height="400"></div>
<div class="divider2"></div>
<p>
<?php
if(strlen($msg) == 31)
else
?>
<?php
$tomorrow = mktime(0,0,0,date("m"),date("d"),date("Y")-18);
<br>
<table >
<tr><td>gender:</td>
</tr>
</table>
<label class="one third first" for="author"><input name=signup type=submit
value="Register" class="button small gradient red" /></label>
</form>
<?php
?>
</p>
</article>
</div>
<div class="clear"></div>
</div>
<div class="one_third">
</ul>
<divclass="tab-container">
<? php
if(isset($msglogin))
echo "<strong>$msglogin</strong>";
?>
<li><strong>Password </strong><input
name=password type=password size="30" /></li>
<li></li>
</form>
</div>
</div>
</div>
</div>
<div> </div>
<div class="one_third">
<div class="tab-wrapper clear">
</ul>
<div class="tab-container">
<?php
echo $msgupdpass;
if(isset($_POST[submitforgetpwd]))
?>
</ul>
<input type="submit" value="Reset Password" name="btnresetpassword"
size="30" class="button small gradient red" />
<?php }
else
?>
<li></li>
<?php
?>
</form>
</div>
</div>
</div>
</div>
</div>
<!--
#####################################################################
########################### -->
<div class="clear"></div>
</div>
</div>
</div>
<?php
include ("[Link]");
?>
<script type="application/javascript">
function validate()
if([Link] == "")
[Link]();
return false;
else if(!([Link](letters)))
return false;
[Link] ();
return false;
[Link]();
return false;
else if([Link]=="")
[Link]();
return false;
else if([Link]=="")
{
alert ("Password should not be
empty");
[Link] ();
return false;
else if([Link]<6 )
[Link]="";
[Link]="";
[Link]();
return false;
[Link]="";
[Link]="";
[Link] ();
return false;
else if([Link] !=
[Link])
{
alert("Password not matching..");
[Link]="";
[Link]="";
[Link]();
return false;
[Link]();
return false;
return false;
else
return true;
}
</script>
<script type="application/javascript">
function validate1()
if([Link] == "")
[Link]();
return false;
else if([Link]=="")
[Link]();
return false;
else
return true;
</script>
<script type="application/javascript">
//Coding to Reset password
function validate2()
If ([Link] == 1)
if([Link] == "")
[Link]();
return false;
else if([Link] == 2)
if([Link] == "")
[Link] ();
return false;
else if([Link]=="")
return false;
else if([Link]<6 )
[Link]="";
[Link]="";
[Link]();
return false;
[Link]="";
[Link]="";
[Link] ();
return false;
else if([Link] !=
[Link])
{
alert("Password not matching..");
[Link]="";
[Link]="";
[Link] ();
return false;
else
return true;
</script>
CHAPTER 6
TESTING
Testing is a process of executing a program with the intent of finding an error.
Testing is a crucial element of software quality assurance and presents ultimate
review of specification, design andcoding.
Testing Objectives:
Testing Principles:
The primary objective for test case design is to derive a set of tests that has the
highest livelihood for uncovering defects in software. To accomplish this objective
two different categories of test case design techniques are used. They are
White boxtesting.
Black boxtesting.
White-box testing
White box testing focus on the program control structure. Test cases are
derived to ensure that all statements in the program have been executed at least once
during testing and that all logical conditions have been executed.
Block-box testing
Testing strategies
A strategy for software testing must accommodate low-level tests that are
necessary to verify that all small source code segments has been correctly
implemented as well as high-level tests that validate major system functions against
customerrequirements.
Testingfundamentals
Information flow for testing flows the pattern. Two class of input provided to
test the process. The software configuration includes a software requirements
specification, a design specification and source code.
Test configuration includes test plan and test cases and test tools. Tests are
conducted and all the results are evaluated. That is test results are compared with
expected results. When erroneous data are uncovered, an error is implied and
debugging commences.
6.1 UNITTESTING
Unit testing is essential for the verification of the code produced during the coding
phase and hence the goal is to test the internal logic of the modules. Using the
detailed design description as a guide, important paths are tested to uncover errors
with in the boundary of the modules. These tests were carried out during the
programming stage itself. All units of Vienna SQL were successfullytested.
6.2 FUNCTIONALTESTING
Functional testing does not imply that you are testing a function (method) of your
module or class. Functional testing tests a slice of functionality of the whole system.
6.3 SYSTEMTESTING
As a rule, system testing takes, as its input, all of the "integrated" software
components that have passed integration testing and also the software system itself
integrated with any applicable hardware system(s). The purpose of integration testing
is to detect any inconsistencies between the software units that are integrated together
(called assemblages) or between any of the assemblages and the hardware. System
testing is a more limited type of testing; it seeks to detect defects both within the
"inter-assemblages" and also within the system as a whole.
6.4 INTEGRATIONTESTING
The main purpose of this testing is to validate the end to end business flow. It
does NOT focus on the cosmetic errors, Spelling mistakes or System testing. This
testing is carried out in separate testing environment with production like data setup.
It is a kind of black box testing where two or more end users will beinvolved
Client
Endusers
Prerequisites of User Acceptance Testing:
6.6 PERFORMANCETESTING
Login
Output
password [Link]
Output
Check for all the features The screen must Contained Success
comments functionality.
Test
Description Expected Output Actual Output Result
Case
In order to fully test that all the requirements of an application are met, there
must be at least two test cases for each requirement: one positive test and one
negative test. If a requirement has sub-requirements, each sub-requirement must have
at least two test cases. Keeping track of the link between the requirement and the test
is frequently done using a traceability matrix. Written test cases should include a
description of the functionality to be tested, and the preparation required to ensure
that the test can beconducted.
test case ID
test casedescription
test step or order of executionnumber
relatedrequirement(s)
test category
author
check boxes for whether the test can be or has beenautomated
pass/fail
remarks
Larger test cases may also contain prerequisite states or steps, and descriptions.
A written test case should also contain a place for the actual result.
In a database system, you may also be able to see past test results and who generated
the results and the system configuration used to generate those results.
Testsummary
Configuration
Besides a description of the functionality to be tested, and the preparation
required to ensure that the test can be conducted, the most time consuming part in the
test case is creating the tests and modifying them when the systemchanges.
Under special circumstances, there could be a need to run the test, produce
results, and then a team of experts would evaluate if the results can be considered as a
pass. This happens often on new products' performance number determination. The
first test is taken as the base line for subsequent test / product releasecycles.
Acceptance tests, which use a variation of a written test case, are commonly
performed by a group of end-users or clients of the system to ensure the developed
system meets the requirements specified or the contract. User acceptance tests are
differentiated by the inclusion of happy path or positive test cases to the almost
complete exclusion of negative test cases.
CHAPTER7
OUTPUTSCREENS
7.1 Registrationpage
7.2 Homepage
7.3 Profilepage
7.4 Changepassword
7.5 Wall postpage
7.6 Friendlist
7.7 Searchfriends
7.10 Gallery
7.11 videos
7.12 Groupspage
7.13 View groups
7.14 Mygroups
7.15 Events
CONCLUSION
FUTURE ENHANCEMENT
The proposed system is restricted to deal with photo sharing in online social
networks. The future work of this model can be extended to deal with different kinds
of files such as audio calls, video calls. Also, we would extend our work to address
security and privacy challenges for emerging information sharing services such as
location sharing and other social network platforms.
[1] A. Besmer and H. Richter Lipford. Moving beyond untagging: Photo privacyin
a tagged world. In Proceedings of the 28thinternational
conference on Human factors in computing systems, pages 1563– 1572. ACM, 2010.
[2] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us:
automated identity theft attacks on social networks. In Proceedings of the 18th
international conference on World wide web, pages 551–560. ACM,2009.
[3] B. Carminati and E. Ferrari. Collaborative access control in online
social networks. In Proceedings of the 7thInternational
Conference on Collaborative Computing: Networking, Applications and
Worksharing (CollaborateCom), pages 231–240. IEEE, 2011.
[4] B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for
social networks. In On the Move to Meaningful InternetSystems
2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006.
[5] B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-
based social networks. ACM Transactions on Informationand
System Security (TISSEC), 13(1):1–38, 2009.
[6] E. Carrie. Access Control Requirements for Web 2.0 Security and [Link]
Proc. of Workshop on Web 2.0 Security &
Privacy (W2SP). Citeseer, 2007.
[7] J. Choi, W. De Neve, K. Plataniotis, and Y. [Link]
face recognition for improved face annotation in personal photo collections shared on
online social networks. Multimedia, IEEE
Transactions on, 13(1):14–28, 2011.
[8] J. Douceur. The sybil attack. Peer-to-peer Systems, pages 251–260,2002.
[9] L. Fang and K. LeFevre. Privacy wizards for social networking sites. In
Proceedings of the 19th international conference on World wideweb, pages 351–360.
ACM, 2010[16] P. Fong. Preventing sybil attacks by privilege attenuation: A design
principle for social network systems. In Security and Privacy (SP), 2011 IEEE
Symposium on, pages 263–278. IEEE,2011.
[10] P. Fong. Relationship-based access control: Protection model and policy
language. In Proceedings of the first ACM conference on Data andapplication