You are on page 1of 7

International Journal of Engineering and Applied Sciences (IJEAS)

ISSN: 2394-3661, Volume-2, Issue-5, May 2015

Secured Wireless Content Transmission over Cloud with


Intelligibility
Amit Kumar Dewangan, Sadaf Rahman

We propose to give accommodation to the client through


Abstract- Information privacy can be successfully protected straight forward, justifiable yet secure correspondence
through encryption. The high convenience of PDAs and tablets interfaces. Our objective is to shield date at all checkpoints
is held onto by shoppers and also the corporate and open through which it ventures i.e. Sender Device Network
segment. Then again, particularly in the non-shopper range the Cloud Recipient Device.
element security assumes a conclusive part for the stage
determination process. The majority of the present
organizations inside of the cell phone area included an extensive
In this universe of cutting edge correspondence, individuals
variety of security components to the at first customer situated favor components through which information can be spared
gadgets or have managed security as a center element from the or recovered rapidly, effectively and safely from any land
earliest starting point (RIM, now BlackBerry). One of the key coordinate. To encourage this goal, PDAs and versatile
security highlights for ensuring information on the gadget or in distributed computing assume an essential part. They
gadget reinforcements are encryption frameworks, which are invigorate the client to utilize strategies for savvy stockpiling
accessible in the greater part of current gadgets. For this reason and recovery of information utilizing foundation, stage and
for existing, Android's distinctive encryption frameworks are programming as an administration being given by 3rd
surveyed and their vulnerability to diverse assaults is examined
gathering.
in point of interest. Taking into account these outcomes a work
process is exhibited, which bolsters organization of the Android
stage and use of its encryption frameworks inside of security In our usage additionally, we should make utilization of the
basic application situations. freshest innovations, i.e. Android and Cloud Computing.
Android is a product stack for cell phones that incorporates a
At long last, we demonstrate that our methodology is anything working framework, middleware and key applications. By
but difficult to introduce and arrange over all Android stages giving an open improvement stage, Android offers designers
including cell telephones, tablets, and little journals as soon as the capacity to construct amazingly rich and creative
possible for the greater part of the customary Android applications. The Android SDK gives the devices and APIs
applications.
important to start creating applications on the Android stage
utilizing the Java programming.
I. INTRODUCTION
Highlights:

. Information is the most critical element to each being. Application system empowering reuse and substitution of
Furthermore, on account of its significance, we embrace parts
stringent measures to secure the stockpiling of information
and guarantee its approved access at distinctive levels so that Dalvik virtual machine upgraded for cell phones
its convenience and uprightness are kept up. Security of any
information bargains both with its capacity and recovery. We Integrated program in view of the open source Web Kit
may apply powerful cryptographic calculations with a motor
specific end goal to encode the information and/or execute a
few verification checks to check the validity of client Optimized illustrations controlled by a custom 2D design
endeavoring to get to it. library; 3D representation taking into account the OpenGL ES
1.0 determination (equipment speeding up discretionary)
We wish to add to an application that empowers the clients to
trade grouped media content, safely from any land coordinate. SQLite for organized information stockpiling
We seek to execute security at all levels, keeping in mind the
end goal to shield the information, right from the purpose of Media support for regular sound, feature, and still picture
its creation to conveyance. Our goal is to be unique in relation positions (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG,
to the existent applications under this space, as most recent GIF)
innovation, usability and versatility.
GSM Telephony (equipment subordinate)

First Author name, Sadaf Rahman, Computer science & engineering, Bluetooth, EDGE, 3G, and Wi-Fi (equipment subordinate)
Dr.C.V.Raman university, Bilaspur,India,9311166150, (Research Scholar
e-mail: sadafbsp@gmail.com) Camera, GPS, compass, and accelerometer (equipment
Secound Auther name, Amit Kumar Dewangan Deptt. Of Computer subordinate)
Science & Information technology ( Assistant Professor
,amit.nitrr@gmail.com,)

149 www.ijeas.org
Secured Wireless Content Transmission over Cloud with Intelligibility

Rich advancement environment including a gadget Content Providers that empower applications to get to
emulator, instruments for investigating, memory and information from different applications, (for example,
execution profiling, and a module for the Eclipse IDE. Contacts), or to share their own particular information

ANDROID ARCHITECTURE: A Resource Manager, giving access to non-code assets, for


example, confined strings, illustrations, and design records
The accompanying outline demonstrates the real segments of
the Android working framework. Every segment is depicted A Notification Manager that empowers all applications to
in more detail beneath. show custom alarms in the status bar

An Activity Manager that deals with the lifecycle of


utilizations and gives a typical route back stack

HISTORY:

Android, Inc. was established in Palo Alto, California, United


States in October, 2003 by Andy Rubin (prime supporter of
Danger), Rich Miner (fellow benefactor of Wildfire
Communications, Inc.), Nick Sears (once VP at T-Mobile),
and Chris White (headed configuration and interface
advancement at WebTV) to grow, in Rubin's words "more
intelligent cell phones that are more mindful of its proprietor's
area and inclinations". In spite of the conspicuous past
achievements of the originators and early workers, Android
Inc. worked furtively, uncovering just that it was taking a shot
at programming for cell telephones. That same year, Rubin
came up short on cash. Steve Perlman, a nearby companion of
Rubin, acquired him $10,000 trade in for cold hard currency
an envelope and denied a stake in the organization.

Applications: Procurement by Google:

Android will dispatch with an arrangement of center Google gained Android Inc. on August 17, 2005, making
applications including an email customer, SMS project, Android Inc. an entirely claimed auxiliary of Google Inc. Key
schedule, maps, program, contacts, and others. All workers of Android Inc., including Andy Rubin, Rich Miner
applications are composed utilizing the Java programming and Chris White, stayed at the organization after the
dialect. procurement. Very little was thought about Android Inc. at the
season of the obtaining, however numerous expected that
Application Framework: Google was want to enter the cell telephone market with this
move.
By giving an open advancement stage, Android offers
designers the capacity to construct greatly rich and inventive Post-obtaining improvement:
applications. Engineers are allowed to exploit the gadget
equipment, access area data, run foundation administrations, At Google, the group drove by Rubin built up a cell phone
set alerts, add notices to the status bar, and much, a great deal stage controlled by the Linux bit. Google showcased the stage
more. to handset creators and bearers on the guarantee of giving an
adaptable, upgradable framework. Google had lined up a
Designers have full access to the same structure APIs utilized progression of equipment segment and programming
by the center applications. The application building design is accomplices and motioned to bearers that it was interested in
intended to disentangle the reuse of segments any application different degrees of collaboration on their part.
can distribute its capacities and some other application might
then make utilization of those abilities. This same system Hypothesis about Google's goal to enter the versatile
permits parts to be supplanted by the client. interchanges business kept on building through December
2006. Reports from the BBC and The Wall Street Journal
Fundamental all applications is a situated of administrations noticed that Google needed its inquiry and applications on
and frameworks, including: cell telephones and it was endeavoring to convey that. Print
and online media outlets soon reported gossipy tidbits that
A rich and extensible arrangement of Views that can be Google was building up a Google-marked handset. Some
utilized to assemble an application, including records, estimated that as Google was characterizing specialized
lattices, content boxes, catches, and even an embeddable web particulars, it was indicating models to PDA producers and
program system administrators.

Open Handset Alliance:

150 www.ijeas.org
International Journal of Engineering and Applied Sciences (IJEAS)
ISSN: 2394-3661, Volume-2, Issue-5, May 2015
attempting to get their code changes include in mainstream
On November 5, 2007, the Open Handset Alliance, a language.
consortium of a few organizations which incorporate
Broadcom Corporation, Google, HTC, Intel, LG, Marvell II. RELATED WORKS
Technology Group, Motorola, Nvidia, Qualcomm, Samsung
Electronics, Sprint Nextel, T-Mobile and Texas Instruments According to Adam Skillen and Mohammad Mannan Mobile
uncovered itself. The objective of the Open Handset Alliance gadgets are progressively being utilized for catching and
is to create open principles for cell phones. Around the same spreading pictures of prominent uprisings and common
time, the Open Handset Alliance additionally uncovered their defiance. To keep such records avoided powers, deniable
first item, Android, a cell phone stage based on the Linux part capacity encryption may offer a suitable specialized
form 2.6. arrangement. Such PDE-empowered capacity frameworks
exist for standard desktop/portable workstation working
Android Open Source Project: frameworks.

The Android Open Source Project (AOSP) is driven by With Mobiflage, we investigate configuration and execution
Google, and is tasked with the support and improvement of difficulties of PDE for cell phones, which may be more
Android. As indicated by the venture "The objective of the helpful to customary clients and human rights activists.
Android Open Source Project is to make an effective true item Mobiflage's outline is incompletely in light of the lessons
that enhances the portable experience for end clients." AOSP gained from known assaults and shortcomings of desktop
additionally keeps up the Android Compatibility Program, PDE arrangements. We additionally consider one of kind
characterizing an "Android good" gadget "as one that can run difficulties in the versatile environment. Regardless of the fact
any application composed by outsider engineers utilizing the that clients take after every one of these rules, we don't
Android SDK and NDK", to anticipate contrary Android guarantee that Mobiflage's outline is totally protected against
usage. The similarity project is likewise discretionary and for any breaks. We need to abstain from giving any misguided
nothing out of pocket, with the Compatibility Test Suite feeling that all is well and good. We introduce Mobiflage here
additionally free and open-source. to energize further examination of PDE-empowered portable
frameworks.
Outline:
According to Zhaohui Wang, Rahul Murmuria, Angelos
Android comprises of a part in view of the Linux piece, with Stavrou , convenient document framework encryption motor
middleware, libraries and APIs written in C and application that uses NIST guaranteed cryptographic calculations for
programming running on an application system which Android cell phones .We offer a near execution examination
incorporates Java-good libraries in light of Apache Harmony. of our encryption motor under diverse working conditions and
Android utilizes the Dalvik virtual machine with without a for distinctive burdens including records and database
moment to spare accumulation to run Dalvik dex-code operations.
(Dalvik Executable), which is generally deciphered from Java
bytecode. Our exploratory results propose a 20 times overhead for
compose operations on the inside capacity. At the point when
The primary equipment stage for Android is the ARM expanding the cryptographic key-length from AES-128 to
building design. There is backing for x86 from the Android x AES-256, we caused an extra execution loss of 10% to 15%,
86 ventures, and Google TV utilizes an extraordinary x86 contingent on the operation performed. In spite of the fact that
adaptation of Android. document operations caused a 20 times overhead, the
database operations had a substantially more direct overhead
Linux: of 58% which represents successive compose and overhaul
DB operations.
Android's part is in light of the Linux portion and has further
structural planning changes by Google outside the normal By advancing the record framework piece size and I/O mode,
Linux piece improvement cycle. Android does not have a we had the capacity increase 20% to 57% execution. Also, we
local X Window System nor does it bolster the full then show that gadget particular streamlining strategies can
arrangement of standard GNU libraries, and this makes it hard likewise give execution support.. Accordingly, we reason that
to port existing Linux applications or libraries to Android. our encryption motor is effortlessly compact to any Android
gadget and the overhead because of the encryption plan is a
Certain components that Google contributed back to the worthy exchange off for accomplishing the classifiedness
Linux piece, prominently a force administration highlight necessity. The information must be put away in an encoded
called wakelocks, were dismisses by mainline bit engineers, arrangement utilizing cryptography on biometric for the
halfway in light of the fact that portion maintainers felt that security reasons. The convention is dazzle as in it uncovers
Google did not demonstrate any expectation to keep up their just the character, and no extra data about the client or the
own particular code. Despite the fact that Google declared in biometric to the confirming server or the other way around.
April 2010 that they would contract two representatives to As the convention is in light of topsy-turvy encryption of the
work with the Linux piece group, Greg Kroah-Hartman, the biometric information, it catches the upsides of biometric
current Linux bit maintainer for the -stable branch, said in validation and in addition the security of open key
December 2010 that he was worried that Google was no more cryptography.

151 www.ijeas.org
Secured Wireless Content Transmission over Cloud with Intelligibility

The client at first selects with the biometric framework which We can actualize more vigorous security calculation
is given by a cloud, once the personality is enlisted his/her keeping in mind the end goal to strengthen the security at
biometric verification points of interest are put away in cloud client level, notwithstanding information transmission.
administration supplier database. The approval subtle
elements are likewise entered at the enlistment time which is Our application is manufactured just to encoded and trade
additionally encoded. pictures. We can conquer this restriction by stretching out it to
trade other MIME substance like, sound and feature.
At whatever point the client needs to utilize any cloud
administration client first uses the biometric verification The application can't check whether there was any event of
benefit as opposed to a customary secret word instrument. system spike or mistake amid information transmission. This
Once validated, the client is diverted to the real cloud constraint can be overcome through execution of successful
administration for which he is approved to use.The system wellbeing check and information resumption systems
Biometrics take into account expanded security, comfort we are wrong, unseemly, or fragmented for the framework
can say that intertwined biometric verification framework will circumstance. Sadly, mistakes or exclusions in necessities are
be novel answer for confirming clients on distributed harder to distinguish. For instance, the product may perform
computing ,which can be given as administration on cloud and precisely as needed under typical utilization, yet the
can be utilized as a solitary sign on. necessities may not effectively manage some framework state.
At the point when the framework enters this issue state,
III.COMPARISON AND CONTRAST: sudden and undesirable conduct may come about. This sort of
issue can't be taken care of inside of the product discipline; it
comes about because of a disappointment of the framework
How is our application not quite the same as alternate and programming designing procedures which created and
applications effectively existent in this space? dispensed the framework prerequisites to the product.
Device Obscurity: This component recognizes our
application from others in a manner that it stores the caught At any rate, a product security affirmation project ought to
interactive media pictures just in the memory card of the guarantee that:
client's versatile handset not at all like different applications
which (additionally) spare the pictures inside the Picture 1. A security assessment has been performed for the product.
Gallery of the telephone.
2. Security necessities have been set up for the product.
2) Cloud Security: By the ethicalness of this element, the
transmitted interactive media pictures by the sender clients 3. Security necessities have been set up for the product
will be put away on the cloud database in an encoded numeric advancement and/or operations and support (O&M) forms.
configuration so that not even the approved client has the
capacity view. This element is actualized with a view that if 4. Each product survey, or review, incorporates an assessment
any client's cloud record is unintentionally traded off, his/her of the security prerequisites.
private put away pictures are not spilled. These (encoded)
watchword ensured pictures are decoded just once they are 5. A design administration and restorative activity procedure
conveyed to some beneficiary's telephone and the is set up to give security to the current programming and to
disentangling should happen on the gadget itself amid runtime guarantee that any proposed changes don't accidentally make
by our application. Dissimilar to the current cloud security infringement or vulnerabilities.
administrations which store the (classified) pictures as seems
to be, abandoning them defenseless against be traded off, our 6. Physical security for the product is satisfactory.
application to a great extent varies from them from this
security point of view. One approach to enhance programming security is to pick up
a superior comprehension of the most widely recognized
IV.SECURITY ANALYSIS shortcomings that can influence programming security. The
list, which is currently in a very preliminary form, contains
Programming security confirmation procedure starts by descriptions of common software weaknesses, faults, and
recognizing and sorting the data that is to be contained in the flaws.
product. The data ought to be ordered by affectability. Case in
point, in the most minimal class, the effect of a security V.LIMITATIONS
infringement is min for a top classification, notwithstanding,
the effect may represent a danger to human life; may have an Sender can convey one picture to one beneficiary at once.
unsalvageable effect on programming proprietor's missions, This limit can be overcome through actualizing better
capacities, picture, or notoriety; or may bring about the loss of multitasking and system streamlining strategies.
huge resources or assets.
We can execute more strong security calculation to
The most genuine security issues with programming based invigorate the security at client level, notwithstanding
frameworks which are create when the product necessities information transmission.
Sender can convey one picture to one beneficiary at once.
This restriction can be overcome through executing better
multitasking and system improvement methods.

152 www.ijeas.org
International Journal of Engineering and Applied Sciences (IJEAS)
ISSN: 2394-3661, Volume-2, Issue-5, May 2015
Our application is assembled just to encoded and trade to advantageously store and recover information from the
pictures. We can beat this constraint by stretching out it to cloud.
trade other MIME substance like, sound and feature.
The clients face issue to deal with the security and
The application can't check whether there was any event of trustworthiness of their information due to the security issues
system spike or blunder amid information transmission. This wherein the information turn out to be to a great degree
confinement can be overcome through execution of viable helpless against be hacked from any piece of the world by any
system wellbeing check and information resumption individual and so as to evade it we required instruments that
mechanism. ensure the information completely.

. There is a huge need of an application that executes an


VI.SUMMARY expansive size of encoding instruments which additionally
include lack of definition procedures in light of the fact that
Subsequent to considering the common looks into, we found encoding and covering up of information are two
that: exceptionally solid and noteworthy perspectives to secure
information.
A large portion of the studies were in view of the way that they
added to their own particular item keeping in mind the end There is a huge need of a basic framework that does not
goal to secure one zone however not the whole substance include much client association and has the capacity perform
transmission overall. the assignments all alone. Clients these days need comfort that
their information ought to ensured wherever it is, be it
All the studies concentrated on one thought just and they handset, system, cloud, server farm or anyplace and our
didn't focus on killing its detriments though we endeavor to application should guarantee that it is done and the clients
adjust the faults of one with the benefits of another procedure. don't need to concern themselves for manual mediation with
respect to security of their touchy information.
The studies for the most part rely on upon the confounded
estimations keeping in mind the end goal to secure the They need that the information ought to be secured naturally,
stockpiling of information while we might concentrate on advantageously and proficiently so they don't consider
shortsighted computations that utilization least assets as well deciphering or hacking by any unapproved power.
as produce productive yield in the base conceivable
turnaround time. Moreover, substantial number of frameworks includes
exceptionally complex scientific computations and methods
The studies obviously demonstrate that they don't ensure the amid facial acknowledgment for ex: that possess colossal
characterized information of the client which may be memory assets, estimation overheads because of processor
comprising of additional touchy data that is valuable for some loads and in this manner moderate turnaround times
examination reason or some check reason, right from the inevitably prompting downtimes.
purpose of its creation and conveyance while in our
exploration, we make a cognizant endeavor to secure the There is a huge need of a framework that rearranges all that,
information at all the levels i.e. Gadget, Network & Cloud in that empowers the client to get to a basic application while
light of the fact that we accept that information is secured on-the-go and encourages him/her to spare also safely recover
exhaustively once it turn out to be non available to the information utilizing streamlined yet exceptionally vigorous
outside world from the distinctive measurements. encoding and lack of definition instruments.

The systems don't talk about the productive asset usage of the Since information these days, is being put away and recovered
client's assets be it equipment or programming while in our digitally through electronic means from any topographical
study we attachment and scaffold this crevice through direction, our goal is to actualize a powerful instrument that
minimizing the utilization utilizing straightforward yet guarantees both its security and trustworthiness thoroughly.
effective lack of definition and encoding components that put
least conceivable burden. Our goal is that this application ought to strengthen the clients
to trade mixed media pictures, adequately, in a secured way,
The studies demonstrated a huge crevice in bridling the force guaranteeing the privacy of correspondence.
of most recent innovations accessible in the business to its
maximum capacity while in our study we might make an It might be used in ordered interchanges like criminal
endeavor to utilize the most recent apparatuses, methods and examinations, business correspondences, and so forth.
advancements cap just are yield arranged additionally have
an unfathomable future extent of extension potential The correspondence and information ought not simply be
outcomes. encoded over the transmission channels and cloud yet the
selective element of Device Obscurity ought to guarantee the
Taking into account the studies and examination directed, we substance security at the client's gadget/ handset level
presumed that: moreover.

There is expansive need of an application that shields client's The solid and safeguard cloud administration ought not just
information from geologically any direction and permits them ensure the honesty of the put away data additionally its

153 www.ijeas.org
Secured Wireless Content Transmission over Cloud with Intelligibility

security in light of the fact that the media content might be put 4. Android Wireless Application Development, S. Conder
away in an encoded way in addition to each client's
and L. Darcey, Addison-Wesley (2010).
information is wrapped in his/her own particular individual
client account on the cloud. 5. Android Application Development in 24 Hours, L. Darcey
and S. Conder, Sams (2010).
We propose to give comfort to the client through
straightforward, justifiable yet secure correspondence 6. The Android Developer's Cookbook, J. Steele, N. To,
interfaces that are effectively safe as well as connect
Addison-Wesley (2011).
brilliantly with the client. Information that is secured at the
cloud level too so that if there is any unapproved access, the 7. Android
unintelligible client is not able to interpret the precise
API: http://developer.android.com/reference/packages.html
substance.
8.Java6API: http://download-llnw.oracle.com/javase/6/docs/
Our objective is to shield the recovery of client information
api/
utilizing multi-layer virtual encryption circles to minimize
messy access to the insignificant levels. 9.GoogleMapsAPI: http://code.google.com/android/add-ons/
google-apis/reference/com/google/android/maps/package-su
We propose to build up an application that uses the most
recent conceivable devices, advances and procedures mmary.html
accessible in the business and gives a streamlined answer for
10.AndroidFundamentals: http://developer.android.com/guid
the end client that ensures the information as well as brilliant,
shrewd, expends less assets and effectively solid. e/topics/fundamentals.html
11.TheJavaTutorials: http://download-llnw.oracle.com/javas
Through this application, we propose to give certainty to the
end client in connection to the security and honesty of his/her e/tutorial/index.html
private data that is of awesome arrangement of significance so
12`.Android Native Development
that when he/she works on our application, not just the
shrewd, far reaching instruments at all purposes of Kit: http://developer.android.com/sdk/ndk/index.html
information transmission ensure the client information
13.AndroidUserInterfaces: http://developer.android.com/gui
additionally make the life of individuals hopeless who even
consider making an endeavor to listen stealthily. de/topics/ui/index.html
14`.DeclaringLayout: http://developer.android.com/guide/to
VII CONCLUSION pics/ui/declaring-layout.html
15.CommonTasks: http://developer.android.com/guide/appe
This application will help the clients to trade interactive
media pictures adequately, in a secured way, guaranteeing the ndix/faq/commontasks.html
privacy of correspondence.
16. Maps External Library:
It might be used in arranged correspondence like criminal http://code.google.com/android/add-ons/google-apis/maps-o
examinations, business correspondence, and so forth. The
verview.html
correspondence and information is not simply encoded over
the transmission channels and cloud however the selective 16.MapsAPIKey: http://code.google.com/android/add-ons/g
element of gadget lack of definition guarantees the substance
oogle-apis/mapkey.html
security at the client gadget/handset level.
17.Icons: http://developer.android.com/guide/practices/ui_g
The dependable and safeguard cloud administration might not
uidelines/icon_design.html
just ensure the honesty of the put away data additionally its
security on the grounds that the sight and sound substance 18.SampleSourceCode: http://developer.android.com/resour
should be put away in an encoded way in addition to each
ces/samples/get.html
client's information is encompassed in his/her own individual
uses account on the cloud. 19.ListofSampleApps: http://developer.android.com/resourc
es/samples/index.html.
References
20.apps-for-androidSampleApps: http://code.google.com/p/a
1. Hello, Android, E. Burnette, the Pragmatic Programmers
pps-for-android/.
(2009).
21.AndroidDeveloper'sBlog: http://android-developers.blogs
2. Professional Android 2 Application Development, R.
pot.com/
Meier, Wiley (2010).
22.DeveloperFAQ: http://developer.android.com/resources/f
3. Beginning Android 2, M. Murphy, Apress (2010).
aq/

154 www.ijeas.org
International Journal of Engineering and Applied Sciences (IJEAS)
ISSN: 2394-3661, Volume-2, Issue-5, May 2015
23.DeveloperForums: http://developer.android.com/resource
s/community-groups.html
24. Android Developer's
Group: http://groups.google.com/group/android-developers?
lnk=
25.XDA-DevelopersForums: http://forum.xda-developers.co
m/
25.Gosling, James, A brief history of the Green project.
Java.net, no date ca. Q1/1998]. Retrieved April 29, 2007.
26. Gosling, James; Joy, Bill; Steele, Guy L., Jr.; Bracha,
Gilad (2005). The Java Language Specification (3rd ed.).
Addison-Wesley. ISBN 0-321-24678-0.
27. Lindholm, Tim; Yellin, Frank (1999). The Java Virtual
Machine Specification Addison-
Wesley. ISBN 0-201-43294-3.
28.java.com - Java for end-users
29. Oracle's Developer Resources for Java Technology.
30.Java SE 7 API Javadocs
31. Oracle's Beginner's tutorial for Java SE Programming
32.A Brief History of the Green Project
33. Michael O'Connell: Java: The Inside Story, SunWord,
July 1995.
34. Patrick Naughton: Java Was Strongly Influenced by
Objective-C (no date).
35. David Bank: The Java Saga, Wired Issue 3.12 (December
1995).
36. Shahrooz Feizabadi: A history of Java in: Marc Abrams,
ed., World Wide Web Beyond the Basics, Prentice Hall,
1998.

155 www.ijeas.org

You might also like