Enhancing Security Of Agent-Oriented Techniques Programs Code Using Jar Files
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. The Agent Oriented Programming & Software Engineering is being focused to design distributed software systems. The agent technology has been dominated to enhance software reusability and maintainability. Now more than 100 Agent toolkits for commercial & research purpose are available. Most of the toolkits are designed using Java language. Although use of agent toolkits makes programming more efficient, but the security of code is not achieved. The security of the program code cannot be ignored. In this paper we discuss the approach of using jar file to enhance the security. The JAR files can be electronically signed & verified. The digital certificates can be used by the programmers. By using the jar file agent program code can be more secure. In this paper we will discuss an approach to achieve the security of the code of agent programs. Now we will discuss how jar file are created & security is to be implemented.
Authors and Affiliations
Vivek Jaglan , Surjeet Dalal , Dr. S. Srinivasan
PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS
This paper investigates and undertakes simulation based study of adhoc routing protocols in wireless sensor networks. In this paper we have compared the performance of two routing protocol AODV and DSR by using random wa...
Abnormal Gait Recognition
Due to increasing crime rate identification using biometrics has become an important field of research. When it is not possible to take snapshot, to read iris, to take finger prints etc then identification using gait may...
Optimized Query Plan Algorithm for the Nested Query
The SQL language allows users to express the queries that have nested sub-queries in them. Optimization of nested queries has received considerable attention over the last few years. Most of the previous optimization wor...
A Novel Approach for English to South Dravidian Language Statistical Machine Translation System
Development of a well fledged bilingual machine translation (MT) system for any two natural languages with limited lectronic resources and tools is a challenging and demanding task. This paper presents the development o...
Power Aware Scheduling for Resource Constrained Distributed Real-Time Systems
Power management has become popular in mobile omputing as well as in server farms. Although a lot of work has been done to manage the energy consumption on uniprocessor real-time systems, there is less work done on thei...