0% found this document useful (0 votes)
80 views2 pages

Title of The Project E-Banking

The document outlines the requirements for an e-banking web application. It will run on Windows XP or later with Microsoft SQL Server 2005 for the database. The client uses Internet Explorer and development tools include Visual Studio .NET 2008. The interface is ASP.NET with C# code behind. Hardware requirements include a PC with 512MB RAM and 20GB hard drive. The objective is to authenticate the web application and users to prevent fraud and only authorize users to access services according to their roles.

Uploaded by

Michael Benilan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views2 pages

Title of The Project E-Banking

The document outlines the requirements for an e-banking web application. It will run on Windows XP or later with Microsoft SQL Server 2005 for the database. The client uses Internet Explorer and development tools include Visual Studio .NET 2008. The interface is ASP.NET with C# code behind. Hardware requirements include a PC with 512MB RAM and 20GB hard drive. The objective is to authenticate the web application and users to prevent fraud and only authorize users to access services according to their roles.

Uploaded by

Michael Benilan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Title of the Project

E-Banking
Operating System Server: Windows XP or later Database Server: Microsoft SQL Server2005

Software Requirements

Client: Microsoft Internet Explorer Tools: Microsoft Visual Studio .Net-2008 User Interface: Asp.Net Code Behind: C#.Net Processor: Intel Pentium or More

Hardware Requirements

Ram: 512 MB Ram Hard Disk: PC with 20GB

Abstract

The objective of the system is to find whether the web application is a genuine one or not. This is done by authenticating the web application by using a cipher key, which can be obtained by implementing standard encryption algorithm. This cipher key is used to identify the fraud web application to avoid misuse of the sensitive information. After authenticating the web application the authorized users will be allowed to access the application to get various services and provide information that includes transactions like inserting, modifying and deleting records, which vary with different kind of the users in a role based web application.

The system will check the users existence in the database and provide the set of services with respect to the role of the user. The application is

based on three-tier architecture.

The cipher key obtained will help to find the

fraud application. The business logic helps in authenticating the application, authorizing the users and providing services. The technologies are chosen by keeping the compatibility and performance as the constraints for the application.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy