skip to main content
10.1145/3466029.3466039acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceegConference Proceedingsconference-collections
research-article

Design and Development Multi-Verification Protocols of A Digital Signed Document System Using Component-Based Architecture

Published:27 July 2021Publication History

ABSTRACT

In the digital age, a transformation of a traditional business to an electronic organization becomes widely general. One of the resolutions is an adopted information technology to design and develop software supporting the whole process of organizations. End users enable to access and use digital services anywhere and anytime. Covid-19 has directed us to face a dramatic death of human life. Social distancing is an announcement of avoiding and touching unknown people, including colleagues, lecturers, and students. In this article, we aim to propose the design and development of a digitally signed document system. The system can handle documents of university processes to advance online forms significantly. By providing the digitally signed document system, a documented strategy can integrate users (e.g., general employees, executives, directors, and lecturers) to send electronic documents with proportional high security. The digital signature of user identification can perform via user identification and verification protocols in many methods. The design and development of software models are approached using rapid application development (RAD). RAD is the most compatible with project factors. The software functionaries of the digitally signed document system are decomposed into components for improving software quality. The interface components deliver indicators of a friendly environment of green information technology as well.

References

  1. Sanjiv Augustine, Bob Payne, Fred Sencindiver, and Susan Woodcock. 2009. Agile project management: Steering from the edges. Commun. ACM 48, 12 (Decomber 2005), 85-89. https://doi.org/10.1145/1101779.1101781Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cockton Gilbert, and Gram Christian. 1996. Design principles for interactive software. Chapman & Hall. Suffolk, London.Google ScholarGoogle Scholar
  3. Darja Smite, Claes Wohlin, Tony Gorschek, and Robert Feldt, 2009. Empirical evidence in global software engineering: a systematic review. Empir. Softw. Eng. J. 15, 91-118. https://doi.org/10.1007/s10664-009-9123-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sera Whitelaw, Mamas A. Mamas, Eric Topol, and Harriette G. V. Spall. 2020. Applications of digital technology in COVID-19 pandemic planning and response. The Lancet Digital Health 2, 8, (June 2009), 435-440. https://doi.org/10.1016/S2589-7500(20)30142-4Google ScholarGoogle Scholar
  5. Gourab Saha. 2017. DSign digital signature system for paperless operation. In Proceedings of the 2017 International Conference on Communication and Signal Processing (ICCSP’17). IEEE, Piscataway, NJ, USA, 108-117. https://doi.org/10.1109/iccsp.2017.8286370Google ScholarGoogle ScholarCross RefCross Ref
  6. Iqtidar A. Shah, Sohail Amjed, and Nasser A. Alkathiri. 2019. The economics of paper consumption in offices. J. Bus. Econ. Manag. 20, 1 (January 2019), 43-62. https://doi.org/10.3846/jbem.2019.6809Google ScholarGoogle ScholarCross RefCross Ref
  7. Ibrahim Akman, and Alok Misha. 2015. Sector diversity in green information technology practices: technology acceptance model perspective. Comput. Hum. Behav. 49, (August 2015), 477-486. https://doi.org/10.1016/j.chb.2015.03.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ibrahim Akman, and Alok Mishra. 2015. Sector diversity in Green Information Technology practices: Technology Acceptance Model perspective. Comput. Hum. Behav. 49, C (august 2015), 477-486. https://doi.org/10.1016/j.chb.2015.03.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Deepti Misha, Ibrahim Akman, and Alok Mishra. 2014. Theory of reasoned action application for green information technology acceptance. Comput. Hum. Behav 36, (July 2014), 29-40. https://doi.org/10.1016/j.chb.2014.03.030Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mason Stephen. 2018. Documents signed or executed with electronic signatures in English law. Comput. Law Secur. Rev 34, 4 (August 2018), 933-945. https://doi.org/10.1016/j.clsr.2018.05.023Google ScholarGoogle Scholar
  11. Ricky N. Dlamini, and Grant R. Howard. 2018. Investigating the antecedents to teaching green information technology (Green IT): A survey of student teachers in Swaziland. In Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT’18). Association for Computing Machinery, New York, NY, USA, 108-117. https://doi.org/10.1145/3278681.3278695Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Thomas Zefferer, and Thomas Knall. 2010. An electronic-signature based circular resolution database system. In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC’10). Association for Computing Machinery, New York, NY, USA, 1840-1845. https://doi.org/10.1145/1774088.1774479Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Martin, James. 1991. Rapid application development. Macmillan Publishing. Indianapolis, United States.Google ScholarGoogle Scholar
  14. Alan Howard. 2002. Rapid Application Development: Rough and Dirty or Value-for Money Engineering?. Commun. ACM 45, 10 (October 2002), 27-29. https://doi.org/10.1145/570907.570925Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ritu Agarwal, Jayesh Prasad, Mohan Tanniru, and John Lynch. 2000. Risks of rapid application development. Commun. ACM, 43, 11es (November 2000, 177-188. https://doi.org/10.1145/352515.352516Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Paul Beynon-Davies, Chris Carne, Hugh Mackay, and Douglas Tudhope. 1999. Rapid application development (RAD): an empirical review. Eur. J. Inform. Syst. 8, 3 (September 1999), 211-223. https://doi.org/10.1057/palgrave.ejis.3000325Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Vadim V. Zubov. 2019. An electronic signature within the digital economy. European Proceedings of Social and Behavioural Sciences, 79, 621-625. https://doi.org/10.15405/epsbs.2020.03.89Google ScholarGoogle Scholar
  18. Ibrahim Lasheen. (2018). Digital signature in E-Commerce security. Middle. East. J. Sci. Res., 1, (February 2018), 26-34.Google ScholarGoogle Scholar
  19. Meennapa Rukhiran, and Paniti Netinant. 2020. A practical model from multidimensional layering personal financial information framework to mobile software interface operations, Journal of ICT 19, 3 (July 2020), 321-349.Google ScholarGoogle Scholar
  20. Chunkit Kwong, Li F. Mu, Jiafu Tang, and Xinggang Luo. 2010. Optimization of software components selection for component-based software system development. Comput. Ind. Eng. 58, 4, 618-624. https://doi.org/10.1016/j.cie.2010.01.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Emmanuel Okewu, and Olawande Daramola. 2015. Component-based software engineering approach to development of a university e-administration system. In Proceedings of the IEEE 6th International Conference on Adaptive Science & Technology (ICAST’15). IEEE, Piscataway, NJ, USA, 1-8. https://doi.org/10.1109/ICASTECH.2014.7068152Google ScholarGoogle Scholar
  22. Barbara R. Barricelli, Fabio Cassano, Daniela Fogli, and Antonio Piccinno. 2019. End-user development, end-user programming and end-user software engineering: A systematic mapping study. J. Syst. Softw., 149, (March 2019). https://doi.org/10.1016/j.jss.2018.11.041.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEEG '21: Proceedings of the 5th International Conference on E-Commerce, E-Business and E-Government
    April 2021
    165 pages
    ISBN:9781450389495
    DOI:10.1145/3466029

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 July 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format