Article Preview
Top1. Introduction
Modern life is far more complex than any other kind of social order, and is primarily aimed at achieving individual objectives, thus fragmenting the social order and reducing the interaction that comes with social contact. Consequently, people rely on social media (e.g. email, social media and video conferencing) to maintain contact and with the passage of time, social e-commerce is also being used, such as social interaction with theATM banking model. This model has enabled a new era of shifting from traditional e-commerce to social e-commerce and Banking industries have adopted this model. This refers to human social interaction (Siricharoen 2019). However, the security of HCI related to social interaction is a very important issue requiring discussion among the research community. One example is social interaction using the ATM Banking security model.
In modern era of software, the component-based software development method is widely used, especially in the distributed social e-commerce system, which has developed through components. Such systems or applications encapsulate the functionality of the business logic process. Apart from that, components also need connectors, which encapsulate the inter-communication of component process (Albassam et al. 2017). The UML 2 provides notation for modelling the component ports that are provided and the necessary interfaces in CBSAs asynchronous communication or synchronous replication communication. The connector’s role within the component-based application is that of a glue that encapsulates the inter-communication mechanisms to perform the functionality that supports the application logic. This provides a major role in component based applications because some components within an application are without offered or required interfaces that need connector support to glue the connection in between the component interaction within the application.
Current approaches for component-based development of social e-commerce often ignore the secure integration process designed by the security concept. There are currently two main methods for component integration. These current methods appear to use a composition process that falls into two main categories: (a) transmitting the message directly; (b) transferring the message indirectly. In these two methods, interaction of components is based directly on inter-communication which corresponds to the direct method call, performing two distinctive roles, both sender and recipient of a message. In this case, the recipient's identity is either known to the sender statically or evaluated dynamically during the execution time.
The direct message transmission method calls for a component that is tightly coupled, in which there is no need of any glue code or connector as shown in figure 1 (a). On the other hand, indirect message transmission connectors are exemplified as separate entities that are defined clearly in the component composition. They are usually glue codes or scripts, which pass messages indirectly between components. To make a connection from one component to another component, a connector provides the link, which provides a method to be notified by the former. In general, the data flow associated with the composition is isolated from the computation in the individual component, when the components are linked through the indirect message transfer figure 1 (b). This figure clearly illustrates that components do not directly call each other but connectors are called in the system method process during the loosely coupled application logic (Albassam et al.2017).
Figure 1.
Direct and Indirect component inter-communication model