Corporate Employee Welfare Network

Authors(2) :-M Vinod Kumar, H.Syed Ali Fathima

Welfare includes anything that is done for the comfort and improvement ofemployees and is provided over and above the wages. Labor welfare entails all those activities of employer which are directed towards providing the employeeswith certain facilities and services in addition to wages or salaries. In the present scenario, people communicate with each other using conventional methods such as messages, phone calls and e-mails. Often, it becomes difficult for one to track the where abouts of other known people and exchange views and messages. Sometimes, the messages exchanged through these methods may not reach the intended receiver. Often important communication may be missing.Corporate Employee Welfare Network is a web application which provides an efficient way that All corporate employees can share following value points using CEW web base applications are Innovative thoughts,All Company Events(photos share),Technical droughts,Work experience,Personal relating things( Property sales and Home rent ),All company growth(share market),All company Employee referral(job vacancy),Matrimonial,Birth days and Travel / Picnic / Get together Plan

Authors and Affiliations

M Vinod Kumar
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
H.Syed Ali Fathima
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Administrator module, Employee module

1. P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
2.G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.
3. E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.
4. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
5. R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.
6. P. Buneman, A. Chapman, and J. Cheney, “Provenance Management
in Curated Databases,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’06), pp. 539-550, 2006.
7. B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
8. OASIS Security Services Technical Committee, “Security Assertion
Markup Language (saml) 2.0,” http://www.oasis-open.org/ committees/tc home.php?wg abbrev=security, 2012.
9. R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
10. B. Crispo and G. Ruffo, “Reasoning about Accountability within
Delegation,” Proc. Third Int’l Conf. Information and Comm. Security
(ICICS), pp. 251-260, 2001.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 269-275
Manuscript Number : CSEIT184155
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M Vinod Kumar, H.Syed Ali Fathima , "Corporate Employee Welfare Network", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.269-275, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview