scholarly journals Measuring Code Complexity in Projects Designed with Aspect/J

10.28945/2611 ◽  
2003 ◽  
Author(s):  
Jana Dospisil

The modularized code encapsulating object interactions is characterized by class hierarchies. In the implementation of mobile agents, we have observed that the changes in agent interaction protocols lead to uncontrolled subclassing and consequently to disorder. This phenomenon is known as entropy. The additional subclassing, modification to protocols, restructuring of the class hierarchies, changes to visibility of attributes, and method overloading result in increased co mplexity of the code. This problem in agent design has been tackled by Kendall (Kendall, 1999) who proposed development using Aspect/J and separation of concerns. Since there has been no proof of reduced complexity, we have proposed metrics for software complexity estimation, and ranking of compositional elements developed with As-pect/J. The metrics have been tested on Java code for mobile agents.

10.28945/2615 ◽  
2003 ◽  
Author(s):  
Jana Dospisil ◽  
Arin Khemngoen

This paper describes research in measuring the code complexity of mobile agent applications designed with aspect-oriented programming (AOP) as captured in the AspectJ™ language. The modularized code encapsulating agent interactions is characterized by class hierarchies which are shared structures. Mobile agent design suffers from frequent changes in interaction protocols which leads to chaotic development. Additional subclassing, modification to protocols, restructuring of the class hierarchies, changes to visibility of attributes and methods overloading result in increased complexity of the code and disorder. Our experonce with fine tuning of protocols shows that the probability that a subclass will not consistently extend the protocol content of its superclass is increasing with the depth of hierarchy. The tools like Hyper/Jand Aspect/J support the separation of concerns thus allowing different approach to evolving the protocol content rather than extending the class hierarchies. In this paper we present the approach to analyzing protocol design and assessing the complexity by measuring the entropy of the mobile agent application code designed with Aspect/J. The comparison of complexity measures with the same mobile agent application designed and maintained as typical Java application indicates reduction in complexity in favor of design with Aspect/J.


2009 ◽  
Vol 95 (2) ◽  
pp. S4-S11
Author(s):  
Alessandro Palladini ◽  
Nicola Testoni ◽  
Luca De Marchi ◽  
Nicolò Speciale

Author(s):  
Eliot Kimber

Many products make XML from Microsoft Word, but consider the reverse: making Word versions of your XML documents, thus using MS Word as a document composition engine. The Wordinator enables automatic creation of high-quality Word documents from XML source. It uses an extension of the Word2DITA project’s SimpleWP (Simple Word Processing markup language) as the input to an Apache POI-based Java application that generates Word documents. XSLT generates the SimpleWP XML, managing the mapping of source XML elements to Word constructs and styles. I consider, in particular, the separation of concerns between the XSLT that generates the SimpleWP XML and the Java code that generates the Word documents.


2015 ◽  
Vol 77 (13) ◽  
Author(s):  
Olumide Simeon Ogunnusi ◽  
Shukor Abd Razak ◽  
Abdul Hanan Abdullah

Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. 


Author(s):  
Nouh Alhindawi ◽  
Mohammad Subhi ◽  
Rami Malkawi ◽  
Ahmad Al-Zuraiqi

Sign in / Sign up

Export Citation Format

Share Document