Multi Banking Transaction Interface Using MVC2 Architecture
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
BANKING SYSTEM PLAYS AN IMPORTANT ROLE IN EVERYONE’S LIFE. WITH THE GROWTH OF THE INTERNET WORLDWIDE THE WORLD HAS COME CLOSER AND CLOSER. SO, BANKS ARE ALSO PROVIDING NET BANKING WHICH PLAYS AN IMPORTANT ROLE IN ONE’S LIFE. ALL MONETARY TRANSACTION AND OTHER FACILITIES ARE BEING PROVIDED BY BANKS. EVERY USER HAS TO MAINTAIN HIS/HER PROFILE FOR DIFFERENT BANKS AND HAS TO REMEMBER USERNAME AND PASSWORD WHICH CAUSES OVERHEAD FOR THE USERS.THIS PAPER PRESENTS THE TRANSACTION INTERFACE OF DIFFERENT BANKING SYSTEM TOGETHER. THE PROPOSED METHOD IN THIS PAPER IS OF USING MVC2 ARCHITECTURE FOR SECURE E-BANKING SYSTEM. TODAY WE HAVE LOTS OF BANK AND FOR TRANSACTION WE HAVE TO TAKE USERNAME AND PASSWORD FOR EACH BANK TO DO THE TRANSACTION. BUT BY USING COMMON USERNAME AND PASSWORD WE CAN DO THE TRANSACTION OF THE BANK BY ADDING THE BANK DETAIL IN THIS WEBSITE. FOR SECURE E-BANKING WE ARE USING MVC2 ARCHITECTURE AND J2EE TECHNOLOGY AND WE ARE ALSO USING THREE LEVEL SECURITIES TO MAKE MORE SECURE AND RELIABLE.
Authors and Affiliations
Vivek Agrawal , Vinay Kumar , Vishal Ghodke , Komal Temdhare
An effective cluster formation with security in mobile ad hoc network
Mobile ad hoc networks have attracted much attention due to their mobility and easy deployment. However, the wireless and dynamic nature of network renders them more vulnerable to various types of security attacks than t...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...
A Study on Application of Artificial Neural Network and Genetic Algorithm in Pattern Recognition
Image processing is an emerging field and lots of research had been performed for the past few years. Image processing has various techniques which are image segmentation, enhancement, feature extraction, classification,...
Study Of Multidomain Query Optimization And Answering
In queries having multiple domains it is seen that general purpose search engines are not able to answer multidomain queries and one of the domain is considered by specific search services but no integrated framework is...
Enhancing The Security of Caesar Cipher Using Double Substitution Method
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for conve...