Corporate Employee Welfare Network
Keywords:
Administrator module, Employee moduleAbstract
Welfare includes anything that is done for the comfort and improvement ofemployees and is provided over and above the wages. Labor welfare entails all those activities of employer which are directed towards providing the employeeswith certain facilities and services in addition to wages or salaries. In the present scenario, people communicate with each other using conventional methods such as messages, phone calls and e-mails. Often, it becomes difficult for one to track the where abouts of other known people and exchange views and messages. Sometimes, the messages exchanged through these methods may not reach the intended receiver. Often important communication may be missing.Corporate Employee Welfare Network is a web application which provides an efficient way that All corporate employees can share following value points using CEW web base applications are Innovative thoughts,All Company Events(photos share),Technical droughts,Work experience,Personal relating things( Property sales and Home rent ),All company growth(share market),All company Employee referral(job vacancy),Matrimonial,Birth days and Travel / Picnic / Get together Plan
References
1. P. Ammann and S. Jajodia, “Distributed Timestamp Generation in Planar Lattice Networks,” ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
2.G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007.
3. E. Barka and A. Lakas, “Integrating Usage Control with SIP-Based Communications,” J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.
4. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
5. R. Bose and J. Frew, “Lineage Retrieval for Scientific Data Processing: A Survey,” ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005.
6. P. Buneman, A. Chapman, and J. Cheney, “Provenance Management
in Curated Databases,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’06), pp. 539-550, 2006.
7. B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.
8. OASIS Security Services Technical Committee, “Security Assertion
Markup Language (saml) 2.0,” http://www.oasis-open.org/ committees/tc home.php?wg abbrev=security, 2012.
9. R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
10. B. Crispo and G. Ruffo, “Reasoning about Accountability within
Delegation,” Proc. Third Int’l Conf. Information and Comm. Security
(ICICS), pp. 251-260, 2001.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.