Abstract: Many organizations are investing in web applications
and technologies in order to be competitive, some of them could not
achieve its goals. The quality of web-based applications could play
an important role for organizations to be competitive. So the aim of
this study is to investigate the impact of quality of web-based
applications to achieve a competitive advantage. A new model has
been developed. An empirical investigation was performed on a
banking sector in Jordan to test the new model. The results show that
impact of web-based applications on competitive advantage is
significant. Finally, further work is planned to validate and evaluate
the proposed model using several domains.
Abstract: This paper proposes a Web service and serviceoriented
architecture (SOA) for a computer-adaptive testing (CAT)
process on e-learning systems. The proposed architecture is
developed to solve an interoperability problem of the CAT process by
using Web service. The proposed SOA and Web service define all
services needed for the interactions between systems in order to
deliver items and essential data from Web service to the CAT Webbased
application. These services are implemented in a XML-based
architecture, platform independence and interoperability between the
Web service and CAT Web-based applications.
Abstract: Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.