Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

To Study the Assign Authorization to Access the Object through Single Sign-On Web Services in Library Management System (LMS)

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Dharmendra Choukse, Umesh Kumar Singh

Dharmendra Choukse and Umesh Kumar Singh. To Study the Assign Authorization to Access the Object through Single Sign-On Web Services in Library Management System (LMS). International Journal of Computer Applications 179(20):34-39, February 2018. BibTeX

	author = {Dharmendra Choukse and Umesh Kumar Singh},
	title = {To Study the Assign Authorization to Access the Object through Single Sign-On Web Services in Library Management System (LMS)},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2018},
	volume = {179},
	number = {20},
	month = {Feb},
	year = {2018},
	issn = {0975-8887},
	pages = {34-39},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2018916364},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In any organization network has a certain way of communication and security based on the network infrastructure. That might support all systems within one physical network containing wireless access, servers, firewalls, access controls and certificates, internal and external devices which enable different subsystems to communicate. The main issue in a large network environment is the importance to distribute the specific individual or group roles to prepare the enterprise for security, and then organize the security by resource and domains, identify the security technologies and complete the requirements to understand how those requirements interact with the network.

Web Services are capable of providing all kinds of services to their clients. The term Web services describe a uniform way of mixing Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol support. XML is used to tag the information, SOAP is used to transfer the information, WSDL is used for relating the facilities are existing and UDDI is used for listing what services are available. Used mainly as a means for businesses to communicate with each other and with consumers, Web services permit organizations to communicate data without intimate knowledge of each other's IT systems behind the firewall. Unlike traditional client/server models, such as a Web server/Web page system, Web services do not provide the user with a GUI. Web services instead share business logic, data and processes through a programmatic interface across a network.


  1. Hien Trang Nguyen, Weiliang Zhao, Jian Yang, “A Trust and Reputation Model Based on Bayesian Network for Web Services”, 2010 IEEE International Conference on Web Services
  2. Stefania Galizia, Alessio Gugliotta and John Domingue, A Trust-Based Methodology for Web Service Selection, International Conferences on Semantic Computing, 2007.
  3. Surya Nepal, Wanita Sherchan and Athman Bouguettaya, A Behaviour-Based Trust Model for Service Web, IEEE International Conference on Service Oriented Computing and Applications,2010
  4. Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim, PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
  5. Manling Zhu, Lin Liu, Zhi Jin, A Social Trust Model for Services, AWRE 2006 Adelaide, Australia.
  6. Yijiao Zhu a, Junhao Wen a, Mingwen Qin a, Guoli Zhou, Web Service Selection Mechanism with QoS and Trust Management, Journal of Information & Computational Science 8: 12 (2011) 2327– 2334.
  7. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2003. Propagation of Trust and Distrust. Proceedings of the 13th Annual International World Wide Web Conference, NewYork,
  8. Cesar Ali “CATRAC: Context-Aware Trust and Role-based Access Control for composite web services” 10th IEEE International Conference on computer and information technology (CIT 2010)
  9. Shanshan Song, Kai Hwang, and Mikin Macwan, “Fuzzy Trust Integration for Security Enforcement in Grid Computing” NPC 2004, LNCS 3222, pp. 9-21.
  10. Wang Meng; Hongxia Xia; Huazhu Song, “A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain”, International Conference CiSE, 2009.
  11. Gao Ying; Zhan Jiang, “A layered trust model based on behavior in service grid“, 2nd International Conference ICACC, 2010.
  12. Kai Wei; Shaohua Tang, “A Multi-level Trust Evaluation Model based on D-S Theory for Grid”, International Conference CIS '09. 2009.
  13. Wu Xiaonian; Zhang Runlian; Zhou Shengyuan; Ma Chunbo, “Behavior Trust Computation Model Based on Risk Evaluation in the Grid Environment”, WRI World Congress WCSE '09, 2009.
  14. Bhanwar, S.; Bawa, S, “Establishing and Evaluating Trust in a Grid Environment”, 10th International symposium ISPAN’09, 2009