OMOS: a Framework for Secure Communication in Mashup Applications

Total Page:16

File Type:pdf, Size:1020Kb

OMOS: a Framework for Secure Communication in Mashup Applications OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne) Yao Vinod Ganapathy Department of Computer Science Rutgers University Piscataway, NJ 08854 {samanz,danfeng,vinodg}@cs.rutgers.edu December 2008 OpenMashupOS.com ACSAC 2008 – 1 / 11 Mashups Introduction . What is a Mashup application? Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction . What is a Mashup application? Mashups Architecture Security in ■ client-side services Seamlessly combine contents from multiple heterogeneous OMOS data sources. Experiments ■ Overal goal: more integrated and convenient end-user experience. ■ Becoming very popular - Web 2.0 OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction . What is a Mashup application? Mashups Architecture Security in . My favorite mashup website Zillow! client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction . What is a Mashup application? Mashups Architecture Security in . My favorite mashup website Zillow! client-side services OMOS . Web desktop (webtop) (e.g. eyeOS, DesktopTwo, G.ho.st, Experiments Netvibes, and Online OS). OpenMashupOS.com ACSAC 2008 – 2 / 11 Mashups Introduction Mashups Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 2 / 11 Architecture Introduction Ways that service providers can expose their services: Mashups Architecture . Server-side services Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 3 / 11 Architecture Introduction Ways that service providers can expose their services: Mashups Architecture . Server-side services Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 3 / 11 Architecture Introduction Ways that service providers can expose their services: Mashups Architecture . Server-side services Security in client-side services . Client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 3 / 11 Architecture Introduction Ways that service providers can expose their services: Mashups Architecture . Server-side services Security in client-side services . Client-side services OMOS Experiments User is involved; AJAX-oriented; More responsive/efficient OpenMashupOS.com ACSAC 2008 – 3 / 11 Security in client-side services Introduction Mashups ■ Service providers use ad-hoc non-secure methods. Architecture Security in client-side services OMOS Experiments OpenMashupOS.com ACSAC 2008 – 4 / 11 Security in client-side services Introduction Mashups ■ Service providers use ad-hoc non-secure methods. Architecture Security in client-side services ■ Consumers need to trust service providers: Not suitable OMOS when dealing with sensitive personal data. Experiments OpenMashupOS.com ACSAC 2008 – 4 / 11 Security in client-side services Introduction Mashups ■ Service providers use ad-hoc non-secure methods. Architecture Security in client-side services ■ Consumers need to trust service providers: Not suitable OMOS when dealing with sensitive personal data. Experiments ■ HTML, JavaScript and browsers are not designed to support client-side communication. OpenMashupOS.com ACSAC 2008 – 4 / 11 Security in client-side services Introduction Mashups ■ Service providers use ad-hoc non-secure methods. Architecture Security in client-side services ■ Consumers need to trust service providers: Not suitable OMOS when dealing with sensitive personal data. Experiments ■ HTML, JavaScript and browsers are not designed to support client-side communication. ■ Trade-Off Between Usability and Security: All or Nothing, Complete isolation vs. complete exposure. OpenMashupOS.com ACSAC 2008 – 4 / 11 Security in client-side services Introduction Mashups ■ Service providers use ad-hoc non-secure methods. Architecture Security in client-side services ■ Consumers need to trust service providers: Not suitable OMOS when dealing with sensitive personal data. Experiments ■ HTML, JavaScript and browsers are not designed to support client-side communication. ■ Trade-Off Between Usability and Security: All or Nothing, Complete isolation vs. complete exposure. OpenMashupOS.com ACSAC 2008 – 4 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame Communication Communication Stack MDP Layer MHTTP Layer Experiments OpenMashupOS.com ACSAC 2008 – 5 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame ■ Design Goals: Communication Communication Stack MDP Layer MHTTP Layer Experiments OpenMashupOS.com ACSAC 2008 – 5 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame ■ Design Goals: Communication Communication Stack ◆ To be compatible with all major browsers without any MDP Layer MHTTP Layer change or extension to the browsers. Experiments OpenMashupOS.com ACSAC 2008 – 5 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame ■ Design Goals: Communication Communication Stack ◆ To be compatible with all major browsers without any MDP Layer MHTTP Layer change or extension to the browsers. Experiments ◆ To provide a powerful abstraction that is flexible and easy to understand and use by mashup developers. OpenMashupOS.com ACSAC 2008 – 5 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame ■ Design Goals: Communication Communication Stack ◆ To be compatible with all major browsers without any MDP Layer MHTTP Layer change or extension to the browsers. Experiments ◆ To provide a powerful abstraction that is flexible and easy to understand and use by mashup developers. ◆ To guarantee mutual authentication, data confidentiality, and message integrity for communication between service provider and consumer. OpenMashupOS.com ACSAC 2008 – 5 / 11 Overview Introduction ■ OMOS OpenMashupOS (OMOS) is a mashup framework that is Overview designed to support secure client-side services. Mashlet Secure Frame-to-frame ■ Design Goals: Communication Communication Stack ◆ To be compatible with all major browsers without any MDP Layer MHTTP Layer change or extension to the browsers. Experiments ◆ To provide a powerful abstraction that is flexible and easy to understand and use by mashup developers. ◆ To guarantee mutual authentication, data confidentiality, and message integrity for communication between service provider and consumer. OpenMashupOS.com ACSAC 2008 – 5 / 11 Mashlet Introduction ■ Mashlet is a client side component that runs in the OMOS Overview browser under the privilege of the principal that is defined Mashlet Secure by the domain name of the server that hosts the mashlet. Frame-to-frame Communication Communication Stack MDP Layer MHTTP Layer Experiments OpenMashupOS.com ACSAC 2008 – 6 / 11 Mashlet Introduction ■ Mashlet is a client side component that runs in the OMOS Overview browser under the privilege of the principal that is defined Mashlet Secure by the domain name of the server that hosts the mashlet. Frame-to-frame Communication Communication ■ Mashlets should be able to communicate securely on the Stack MDP Layer client side, meaning that the communication protocol MHTTP Layer guarantees: Experiments OpenMashupOS.com ACSAC 2008 – 6 / 11 Mashlet Introduction ■ Mashlet is a client side component that runs in the OMOS Overview browser under the privilege of the principal that is defined Mashlet Secure by the domain name of the server that hosts the mashlet. Frame-to-frame Communication Communication ■ Mashlets should be able to communicate securely on the Stack MDP Layer client side, meaning that the communication protocol MHTTP Layer guarantees: Experiments ◆ Mutual Authentication ◆ Confidentiality ◆ Message Integrity OpenMashupOS.com ACSAC 2008 – 6 / 11 Mashlet Introduction ■ Mashlet is a client side component that runs in the OMOS Overview browser under the privilege of the principal that is defined Mashlet Secure by the domain name of the server that hosts the mashlet. Frame-to-frame Communication Communication ■ Mashlets should be able to communicate securely on the Stack MDP Layer client side, meaning that the communication protocol MHTTP Layer guarantees: Experiments ◆ Mutual Authentication ◆ Confidentiality ◆ Message Integrity OpenMashupOS.com ACSAC 2008 – 6 / 11 Mashlet Introduction ■ Mashlet is a client side component that runs in the OMOS Overview browser under the privilege of the principal that is defined Mashlet Secure by the domain name of the server that hosts the mashlet. Frame-to-frame Communication Communication ■ Mashlets should be able to communicate securely on the Stack MDP Layer
Recommended publications
  • A Web Desktop Or Webtop Is a Desktop Environment Embedded in a Web Browser Or Similar Client Application
    II BASIC THEORY II.1 What is Web Desktop? A web desktop or webtop is a desktop environment embedded in a web browser or similar client application. A webtop integrates web applications, web services, client-server applications, application servers, and applications on the local client into a desktop environment using the desktop metaphor. Web desktops provide an environment similar to that of Windows, Mac, or a graphical user interface on Unix and Linux systems. It is a virtual desktop running in a web browser. In a webtop the applications, data, files, configuration, settings, and access privileges reside remotely over the network. Much of the computing takes place remotely. The browser is primarily used for display and input purposes. II.2 History In the context of a web desktop, the term Webtop was first introduced by the Santa Cruz Operation (SCO) in 1994 for a web-based interface to their UNIX operating system. Andy Bovingdon and Ronald Joe Record, who both explored the concepts in different directions, are often credited as the inventors. II.3 About eyeOS eyeOS is an open source web desktop written in mainly PHP, XML, and JavaScript. It acts as a platform for web applications written using the eyeOS Toolkit. It includes a Desktop environment with 67 applications and system utilities. It is accessible by portable devices via internet. III.3 eyeOS Implementation III.3.1 Advantages of eyeOS • Convenience: A personalized desktop on every supported client device • Mobility: Access your desktop anywhere there is a supported client device • Session Management: Server-side session management allows roaming users to access restored sessions from anywhere III.3.2 Limitations Security: Due to the fact that all data is transferred over the internet, it might be possible for a hacker to intercept the connection and read data.
    [Show full text]
  • OS X Recovery
    Apple Pro Training Series OS X Support Essentials Kevin M. White and Gordon Davisson Apple Pro Training Series: OS X Support Essentials Kevin M. White and Gordon Davisson Copyright © 2013 by Peachpit Press Published by Peachpit Press. For information on Peachpit Press books, go to: www.peachpit.com To report errors, please send a note to [email protected]. Peachpit Press is a division of Pearson Education. Apple Series Editor: Lisa McClain Production Coordinator: Kim Elmore, Happenstance Type-O-Rama Technical Editor: Adam Karneboge Apple Reviewers: Shane Ross, Anne Renehan, Margaret Bethel Apple Project Manager: Shane Ross Copy Editors: Darren Meiss, Jessica Grogan Proofreader: Darren Meiss Compositor: James D. Kramer, Craig Johnson; Happenstance Type-O-Rama Indexer: Jack Lewis Cover Illustration: Kent Oberheu Cover Production: Cody Gates, Happenstance Type-O-Rama Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For information on getting permission for reprints and excerpts, con- tact [email protected]. Notice of Liability The information in this book is distributed on an “As Is” basis, without warranty. While every pre- caution has been taken in the preparation of the book, neither the author nor Peachpit Press shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the computer software and hardware products described in it.
    [Show full text]
  • Cisco Unified Presence Server Serviceability Administration Guide Release 1.0(3)
    Cisco Unified Presence Server Serviceability Administration Guide Release 1.0(3) Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-11383-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Survey on Web Based Operating Systems
    © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Survey on Web based Operating Systems 1Shubham kumar sahu, 2Dr. R.K. Khare 1Pusuing-M.Tech, 2Assoc. Prof. & HOD 1Department of Computer Science and Engineering, 1Shri Shankaracharya Engineering College (SSEC), Bhilai, India. Abstract : This survey has been done to collect the knowledge and make comparisons between the available web based operating system / webtop ,briefly mentioning the points and features of different webos and also the history of web os , their types, working methods and how useful and also covering the security of the available web operating system IndexTerms – CMS, WEBOS, WEBTOP. I. INTRODUCTION An operating system (OS) is defined as special type of program that organizes and controls the hardware of your computer and software system. operating systems communicate directly with hardware system and functions as a platform for different applications. Let it be it's Windows, Linux, UNIX or mac OS X, your pc depends on its OS to operate. A Web OS can be defined as user interface (UI) that permits individuals to access applications keep fully or partly on the net. it would mimic the user interface of traditional pc operating systems like Windows, however it does not communicate directly with the computer's hardware. The user should still have a standard OS on his or her laptop Some group of people use the term "WebOS" rather than web OS, however there's a issue with this term. WebOS is that the name of a project that the University of California, Berkeley began in 1996.
    [Show full text]
  • CMS) Lecture 15: Content Management in Web 2.0/Web 3.0 Mariusz Trzaska, Ph
    Content Management Systems (CMS) Lecture 15: Content Management in Web 2.0/Web 3.0 Mariusz Trzaska, Ph. D. [email protected], http:// www.mtrzaska.com Agenda Introduction Web 2.0 Web 3.0 Interesting systems / services / portals Web 4.0 i 5.0 Summary Materials form Wikipedia.org, especially from Web 2.0, Web 3.0. Content management 2 Web 2.0 Source: http://en.wikipedia.org/wiki/Web_2.0 Content management 3 Web 2.0 (2) Tim O'Reilly (creator of this concept and founder of O'Reilly): Web 2.0 is a business revolution in the computer industry caused by treating the Internet as a platform and trying to understand the sources of success on it. Dario de Judicibus (IBM): Web 2.0 is a knowledge-driven environment where human interaction generates content that is published, managed, and used in web applications in a service-oriented architecture. Content management 4 Web 2.0 (3) Stephen Fry (British Guardian): o an idea in people's heads rather than a reality. It’s actually an idea that the reciprocity between the user and the provider is what's emphasized. In other words, genuine interactivity, if you like, simply because people can upload as well as download. It can also signify / divert the passage from the "passive" to "active" user: users create content themselves - the social element. Content management 5 Web 2.0 - phenomena Folksonomy (collaborative tagging, social classification, social indexing, social tagging) – to describe content. Unlike the classic "indexing" can be done by content recipients (real people). Platform - The Internet has become a heterogeneous platform for launching services and applications.
    [Show full text]
  • The Use of Open Source GIS Software and Its Impact on Organizations
    Open Source Software: The use of open source GIS software and its impact on organizations Author Mahmoud Refaat Nasr Student ID Number: M00033608 [email protected] Supervisor Carlisle George, PhD June 2007 Middlesex University School of Computing Science A thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Business Information Technology Open source GIS software and its impact on organizations Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License < http://creativecommons.org/licenses/by-nc-nd/3.0/ > You are free: • to Share — to copy, distribute and transmit the work Under the following conditions: • Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). • Noncommercial. You may not use this work for commercial purposes. • No Derivative Works. You may not alter, transform, or build upon this work. • For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this document/web page. • Any of the above conditions can be waived if you get permission from the copyright holder. • Nothing in this license impairs or restricts the author's moral rights. II Open source GIS software and its impact on organizations Acknowledgements I still remember my first orientation session in June 2005 when I had just started my Master program. Back then it all seemed like a long journey and the thesis I am presenting now seemed so distant.
    [Show full text]
  • Migration Guide DELL.COM/Windows7enterprise a Supplement to Dell Power Solutions 2010 Issue 1
    WINDOWS 7 MIGRATION GUIDE DELL.COM/Windows7Enterprise A Supplement to Dell Power Solutions 2010 Issue 1 MAPPING OUT AN EFFICIENT MIGRATION STRATEGY FEATURE SECTION EXPERT NAVIGATION Capitalizing on Mobility Features Dell Services Help Simplify for Fast, Secure Remote Access the Path to Migration STK STK NO: DPS-201001-WIN7 Accelerating Deployments EARLY ADOPTERS with Client Management Tools Windows 7 Deployment Success Stories from Addressing Windows 7 Australia, the UK, and the US Application Compatibility Issues Dell Power Solutions Special Edition DELL.COM/PowerSolutions Tony Mike Branch Director IT Director Sally Salesperson Productivity & Efficiency. Any time. Any place. Don’t let anyone tell you that freedom comes at the cost of control. With Windows® 7 and Windows Server® 2008, users get more powerful search, smoother multitasking and the ability to work from virtually anywhere without a VPN. Add System Center and the Microsoft® Desktop Optimization Pack, and you get more automated PC management and increased control over your environment. Control for you and flexibility for your users. Optimized may not be a strong enough word. To learn more about how desktop optimization can drive efficiencies go to itseverybodysbusiness.com/optimize Snap this tag to get the latest news on desktop optimization or text OPTIMIZE to 21710 Get the free app for your phone at http://gettag.mobi 74714_10M_Desktop_Optimization_M4r.pgs 02.17.2010 20:12 SO5 X1a WINDOWS 7 MIGRATION GUIDE A Supplement to Dell Power Solutions 2010 Issue 1 DELL.COM/Windows7Enterprise CONTENTS MAPPING OUT AN EFFICIENT 6 MIGRATION STRATEGY Before transitioning client systems to the Microsoft® Windows® 7 OS, organizations must first take diligent steps to ensure that a suitable IT infrastructure is in place.
    [Show full text]
  • Rit Croatia Program Delivery Plan for Academic Year 2021/2022
    RIT CROATIA PROGRAM DELIVERY PLAN FOR ACADEMIC YEAR 2021/2022 PROGRAM TITLE: WEB AND MOBILE COMPUTING – ZAGREB TYPE OF PROGRAM: Undergraduate professional program LOCATION: Zagreb FALL SEMESTER DATES: September 1st – December 21st FALL SEMESTER FINALS: December 13th – 17th SPRING SEMESTER DATES: January 17th – May 12th SPRING SEMESTER FINALS: May 4th – 10th LANGUAGE: English 1. FALL SEMESTER SCHEDULE Fall Semester 2211 Zagreb Schedule 08:00 08:30 09:00 09:30 10:00 10:30 11:00 11:30 12:00 12:30 01:00 01:30 02:00 02:30 03:00 03:30 04:00 04:30 05:00 05:30 06:00 06:30 07:00 07:30 08:00 08:30 09:00 09:30 Financ. Mgmt - 17486 Financ. Mgmt - 17443 Global Entry - 17385 Consumer Behavior - 17453 Princ. Of Marketing - 17452 Heritage and Tourism - 18988 Global Entry - 19571 User Experience - 17357 FINC-220 (Condic Jurkic) FINC-220 (Condic Jurkic) INTB-550 (Markovic) MKTG-350 (Anticic) MKTG-230 (Anticic) ANTH-328 (Brassard) INTB-550 (Markovic) ISTE-260 (Radovan) online OS online OS online OS online OS online OS online OA online OS online OS Business Ethics - 17407 Business Ethics - 17408 Business Ethics - 17409 Global Entry - 17386 Global Entry - 17387 Comp.-B.An-17429 Comp.-B.An.-17430 Comp.-B.An.- 17431 Comp.-B.An -17432 MGMT-340 (Tafra) MGMT-340 (Tafra) MGMT-340 (Tafra) INTB-550 (Markovic) INTB-550 (Markovic) MGIS-101 (Bara) online MGIS-101 (Bara) online MGIS-101 (Bara) online MGIS-101 (Bara) online online OS online OS online OS online OS online OS OS OS OS OS RIT 365 - 17380 Writing Seminar - 17363 Advertising and Promotions - 17460 YOPS-010 (Miscin) UWRT-150 (Miscin) MKTG-370 (Draskovic) online OS online OS online OS Intermediate German I - 17413 Intermediate German I - 17414 App Dvlpmt Practices - 17423 College Algebra - 17496 Intro to Philosophy - 18972 MLGR-301 (Bozinovic) MLGR-301 (Bozinovic) ISTE-422 (Marasovic) MATH-101 (Soric) PHIL-101 (Borsic) online OS online OS online OS online OS online OS College Algebra - 17378 Crit.
    [Show full text]
  • Applications of Web Based Operating System
    International Journal of Combined Research & Development (IJCRD) eISSN:2321-225X;pISSN:2321-2241 Volume: 1; Issue: 2; June –2013 Applications of Web based Operating System Mr. Rajesh Sharma Research Scholar , Department of Computer Science NITK,Surathkal ,India Abstract :WebOS (Web based operating system) your web browser, one contender is well on the is a new form of Operating Systems. You can use way to making it possible. your desktop as a virtual desktop on the web, Web Operating Systems (WebOS) is: “A software accessible via a browser, with multiple integrated platform that interacts with the user through a web built-in applications that allow the user to easily browser and does not depend on any particular manage and organize her data from any location. local operating system.”Web operating systems are Desktop on web can be named as WEBtop. A new also commonly referred to as Web desktops or form of computing known as cloud computing can WEBTOPS. help us to design web based operating systems for future. This paper starts with a introduction of "A web desktop or webtop is a network application system for integrating web applications into a web WebOS and its benefits . For this paper , We have based work space. It is a virtual desktop on the reviewed some most interesting WebOS available web, running in a web browser as software. Web nowadays and tried to provide a detailed desktops often are characterized by an environment description of their features. We have identified similar to that of Windows, Mac, or Linux, but are some parameters as a comparison criteria among now considered to have much more functionality them.
    [Show full text]
  • Software Standards
    Appendix B Software Standards DESKTOP VIRUS PROTECTION Approved Products: Network Associates McAfee Virus Scan Summary: All District of Columbia workstations will use McAfee Virus Scan software to protect the District Wide Area Network (DCWAN) from malicious code. New computers should have the Virus Scan software installed and configured prior to being deployed. Rationale: Network Associates McAfee Virus Scan was selected for its robust management capabilities when partnered with the McAfee Event Policy Orchestrator; it also has a proven track record within the virus protection arena. OCTO will implement the product in such a manner that new versions and virus signature updates will automatically be deployed to desktop PCs. Further, OCTO will be able to push new virus signatures to the desktop in response to new and highly destructive viruses. Legacy Products: All workstations will be upgraded or switched to the most current version of Network Associates McAfee Virus Scan software. OCTO purchased an enterprise license for McAfee that entitles all District agencies to use the product. Implementation Strategy: McAfee virus protection software will be rolled out to the District of Columbia in phases to ensure the integrity of all assets and data. If appropriate, OCTO will use the Event Policy Orchestrator application to push the Virus Scan client out to desktop PCs.. Projected Life: McAfee is expected to be the desktop virus software product of choice for the foreseeable future. As new versions become available, OCTO will review the product and time upgrades accordingly. OFFICE AUTOMATION Approved Products: Office XP Standard Office XP Professional Summary: All new purchases will be Office XP Standard.
    [Show full text]
  • CONTENTS President Dr
    Executive Committee Volume No.34 Issue No. 4 July 2010 2010-11/12 CONTENTS President Dr. S Subramanian Division-III Prof. P Thrimurthy [email protected] (Applications) Theme Section : Women in ICT [email protected] Women in Information Technology (IT) Mr. H R Mohan Division-IV Netiva Caftori [email protected] (Communications) 04 Vice-President “Understanding the Expectations of Women Professionals in Mr. M D Agrawal Prof. Swarnalatha Rao Division-V [email protected] 06 Information Technology from their Organizations” – [email protected] (Edu. & Research) A Research Initiative of Empowering Women in IT (eWIT) Hon. Secretary Vijayalakshmi Rao, Sumitra Seshan Prof. H R Vishwakarma Increasing women’s employment in ITEC – [email protected] 09 overcoming the ‘revolving door syndrome’ Christina Evans Hon. Treasurer Nominations Committee Mr. Saurabh H Sonawala Role of Gender in Children’s Uses and Attitudes towards Technology [email protected] Dr. Shyam Sunder Agrawal 12 Vidal Adadevoh Immd. Past President Prof. (Dr.) U K Singh Men vs. Women – Supporting Your Computer Problems Mr. S Mahalingam 14 Pam Jensen [email protected] Dr. Suresh Chandra Bhatia Women in FOSS : Technology, Liberalization, Freedom and Women 15 Kadambari Devarajan Women in Computing Regional Vice-Presidents Publications Committee 20 Matthew Abbruscato Chairman Women Leads on the early MicroVAX Chip Team Mr. M P Goel (Region I) Prof. S. V. Raghavan 21 Steve N Teicher [email protected] [email protected] HR Column Dr. D P Mukherjee (Region II) [email protected] HR & Legal Issues in IT Chief Editor 23 Prasanna Sai Dr.
    [Show full text]
  • Web Operating Systems
    Open Access Library Journal, 2014, 1, 1-5 Published Online June 2014 in OALib. http://www.oalib.com/journal http://dx.doi.org/10.4236/oalib.1100451 Web Operating Systems Ananya Tripathi Amity School of Engineering and Technology, Amity University, Noida, India Email: [email protected] Received 5 April 2014; revised 10 May 2014; accepted 12 June 2014 Copyright © 2014 by author and OALib. This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ Abstract One of the upcoming topics that have rapidly gained popularity these days in the area of operating system is a Web or Online Operating System. The implementation of this technology is based on the Internet and distributed computing. The objective of this technology is to deliver the full bene- fit of the World Wide Web. Online Operating Systems include mechanisms for persistent storage, remote process execution, client management, authentication and security. This paper presents an overview of a typical Online OS. It describes its services provided, the underlying technologies exploited, advantages of using it and some of its practical applications. Additionally, the paper discusses some of the issues and concerns surrounding the implementation and design of an On- line OS. Keywords Web OS, Online OS, Distributed Computing Systems Subject Areas: Distributed Computing 1. Introduction Development of operating systems enabling global computing is an upcoming issue these days. Such an operat- ing system is called the Web Operating System or Online Operating System. These terms have been used inter- changeably in this paper. To start off with, an operating system (OS) is a special kind of program that organizes and controls computer hardware and software.
    [Show full text]