Corporate Employee Welfare Network

Authors

  • M Vinod Kumar  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
  • H.Syed Ali Fathima   Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Keywords:

Administrator module, Employee module

Abstract

Welfare includes anything that is done for the comfort and improvement ofemployees and is provided over and above the wages. Labor welfare entails all those activities of employer which are directed towards providing the employeeswith certain facilities and services in addition to wages or salaries. In the present scenario, people communicate with each other using conventional methods such as messages, phone calls and e-mails. Often, it becomes difficult for one to track the where abouts of other known people and exchange views and messages. Sometimes, the messages exchanged through these methods may not reach the intended receiver. Often important communication may be missing.Corporate Employee Welfare Network is a web application which provides an efficient way that All corporate employees can share following value points using CEW web base applications are Innovative thoughts,All Company Events(photos share),Technical droughts,Work experience,Personal relating things( Property sales and Home rent ),All company growth(share market),All company Employee referral(job vacancy),Matrimonial,Birth days and Travel / Picnic / Get together Plan

References

1. P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
2.G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.
3. E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.
4. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
5. R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.
6. P. Buneman, A. Chapman, and J. Cheney, “Provenance Management
in Curated Databases,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’06), pp. 539-550, 2006.
7. B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
8. OASIS Security Services Technical Committee, “Security Assertion
Markup Language (saml) 2.0,” http://www.oasis-open.org/ committees/tc home.php?wg abbrev=security, 2012.
9. R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
10. B. Crispo and G. Ruffo, “Reasoning about Accountability within
Delegation,” Proc. Third Int’l Conf. Information and Comm. Security
(ICICS), pp. 251-260, 2001.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
M Vinod Kumar, H.Syed Ali Fathima , " Corporate Employee Welfare Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.269-275, March-April-2018.