Enhancing Security Of Agent-Oriented Techniques Programs Code Using Jar Files

نویسندگان

  • Vivek Jaglan
  • Surjeet Dalal
  • S. Srinivasan
چکیده

Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. The Agent Oriented Programming & Software Engineering is being focused to design distributed software systems. The agent technology has been dominated to enhance software reusability and maintainability. Now more than 100 Agent toolkits for commercial & research purpose are available. Most of the toolkits are designed using Java language. Although use of agent toolkits makes programming more efficient, but the security of code is not achieved. The security of the program code cannot be ignored. In this paper we discuss the approach of using jar file to enhance the security. The JAR files can be electronically signed & verified. The digital certificates can be used by the programmers. By using the jar file agent program code can be more secure. In this paper we will discuss an approach to achieve the security of the code of agent programs. Now we will discuss how jar file are created & security is to be implemented. KeywordsIntelligent agent; Agent-oriented Programming; JAR File; Security;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

JAR File Fingerprinting Techniques

Java Archive (JAR) file is a popular way to aggregate Java class files and resources into one package for distributing applications and/or libraries. JAR file format is developed based on the popular ZIP file format, while providing a convenient way to organize Java byte code for distribution in the open source community, JAR added extra layer of encapsulation and made it more difficult to tell...

متن کامل

The Initium X.509 Certificate Wizard

This paper describes the use of the Thawte’s “Web of Trust” X.509 certificates for signing and distributing executable Jar resources. A keytool wizard (called the Initium X.509 Certificate Wizard) was developed in order to help with the importation and management of certificates. A signed Jar file generally indicates that the signer authorizes the contents. Signing is accomplished using a certi...

متن کامل

A CASE-Oriented Configuration Management Agent

Traditional make utilities usually lack the necessary functionality for the management of multiple configurations in one source code tree. Our CASE-oriented configuration management agent, the Viennese Make (VMake) is platform-independent and runs currently on a number of UNIX systems and on Open \.'MS. VMake supports, in addition to common m•ke features, a number of CASE tasks in sub-agents, l...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

Aspect-Oriented Programming Runtime-Enforcement of Temporal Properties in Security-Critical Software

The Aspect-Oriented Programming paradigm has been advocated for modularisation of cross-cutting concerns in large systems. Various applications of this approach have been explored in the literature, one of which is that of runtime-verification based on assertions or temporal properties. Manually weaving temporal properties to ensure correct execution into a large code base is difficult to achie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011