StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Strong Named Assemblies (DOT NET) - Research Paper Example

Cite this document
Summary
Strong name assembly Name: Number: Course: Lecturer: Date: Abstract With security in information systems becoming an important factor, this has been extended to the programming stage of information systems. There are many information security holes that have opened avenues for hackers to get into the systems while they are being used in the field…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Strong Named Assemblies (DOT NET)
Read Text Preview

Extract of sample "Strong Named Assemblies (DOT NET)"

Download file to see previous pages

This report will look at this new feature and how it works in OT NET. Introduction Strong Name (often referred to as SN) is a new technology that was introduced with .NET platform and it has many features and possibilities with it. It is a feature that comes with a lot of controversy; many believe it is a security feature, which, according to the technocrats behind this technology, is wrong, while others believe it is a new technology that is used to identify assemblies. Strong Assembly is a new technology that is built on cryptography and primary digital signatures.

In encryption, one user will get the public/private key that will be used to encrypt/decrypt. After this, the data will be taken and run through some algorithm for hashing and a hash of data is generated after this process. After this, the hash is encrypted by the private key of a user and attached in the system as plain data. The data is then sent to another user who undertakes an encryption process to ensure that the data has not been tempered with. The bottom line here is that the process seeks to check whether data has been tempered with.

In case of Strong Name, the data will represent assemblies. It undergoes the same process. The main reason why this whole process is being undertaken is so that we have unique assemblies being created. It is used so that we have unique assemblies (Fowler, 2003). Features of Strong Name Assemblies There are two features of strong name assemblies in .NET. The first feature is that if versioning. There is a problem in .NET that is called DLL hell. This is namespace collision. This is something that is solved by SN assemblies in .NET. With this technology, it is possible for developers to distribute the same names of files.

Assemblies which are signed using SN, have a protection and stored in different spaces. In addition to this collision prevention, SN also helps developers to undertake correct versioning of their programs. This is the reason why it is advisable to have namespaces which are separated and signed differently before publishers want to use Global Assembly Cache (GAC) (Deborah, 2006). Another important feature of Strong Name is that of authentication. This is the process where the developers and users of .

NET want to be sure of the origin of a given code. This feature gets its use in different places. This can be used in assigning some publishers higher permissions. Another way is that we can make sure that the code is provided by a given supplier (Christian, & Gavin, 2005). How to assign a strong name in .NET The procedure for assigning a strong name in .NET will involve some steps. The assigning of a strong name will be undertaken by the use of a Strong Name tool (sn.exe) that normally comes bundled with .

NET framework software development kit SDK). This tool generates a cryptographic key pair. After this, the proper customer attribute is added to the source so that the compiler will be in a position to emit the assembly that will be used. The assembly will be emitted with a strong name. The attribute one uses will depend on the key pair that has been used to undertake the signing process (Burgess, Sellitto, &Karanassios, 2009). Where to find the key The key can be contained in a file or it can be contained in a key container that is found within a cryptographic service provider (CSP).

This process will generate assemblies that are

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Strong Named Assemblies (DOT NET) Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1462432-strong-named-assemblies-dot-net
(Strong Named Assemblies (DOT NET) Research Paper)
https://studentshare.org/information-technology/1462432-strong-named-assemblies-dot-net.
“Strong Named Assemblies (DOT NET) Research Paper”, n.d. https://studentshare.org/information-technology/1462432-strong-named-assemblies-dot-net.
  • Cited: 0 times

CHECK THESE SAMPLES OF Strong Named Assemblies (DOT NET)

Graffiti Art on Public and Private Property

The paper analyzes "Graffiti Art".... Considerations on ‘graffiti' and ‘green space' were among the top priorities.... The team had to present their results to the parliament, which is further independent about taking any kind of action.... hellip; A report on the topic “scrutiny of “Envirocrime” was set out on April 2003, by the committee made under the British Parliament following the London Act 1999....
5 Pages (1250 words) Essay

Publication Idea - Business for Winners

Business Reports and Letters An Idea for a New Publication Publication Idea The publication idea article that I would be very much interested to read is the one that makes an effort to provide business people with tips on how to succeed and maintain this position.... hellip; The proposed name of publication is Business for Winners....
13 Pages (3250 words) Assignment

Lord Byron and Greece

lutionary movements in Italy and Spain, Lord Byron published his own journal named 'Liberal', "Byron defined a liberal as one interested in national sovereignty, not social reform" 3.... Munro has written about Byron that "Byron was strong in his believes.... Byron started taking interest in Greek politics when he attended the House of Lords where he became a strong advocate of social reform....
16 Pages (4000 words) Essay

Critical Difference Between Java and C#

The C# language is considered to be an object-oriented programming language that permits programmers to rapidly construct a wide range of functions for the Microsoft .... ET platform.... The objective of C# and the .... ET platform is to cut down development time thus allowing developers… to truly spend their time and strength working on their application and business logic instead of perturbing about other low level testing issues such as memory management, safety matters, building low level libraries, array bounds checking , etc....
12 Pages (3000 words) Essay

Market Periphery Surrounding the Business Environment of IKEA

At the outset of the planning stage, a crucial factor which can be recognized is that the strong brand name of the company would certainly help it to establish its one of the invaluable offerings i.... coffee tables for a renowned Swedish company IKEA.... The company would intend to revitalize the product after completely analyzing the current market situation....
18 Pages (4500 words) Essay

Duraz Mobile Pet Grooming

The services provides will include both cleaning and hygiene care for pets such as dogs, cats and others.... The services will also improve the appearance of the… Our groomers will be professionally trained on various ways of handling pets.... Home services as well as store services at various parts of the city will be available (CHANG, 1749)....
9 Pages (2250 words) Research Paper

The Major Goal of LINQ to SQL: Relational Databases and the Programming Logic

dot net is very much a product in evolution with each version correcting design features and adding enhancements to increase ease of use, scalability, portability and adaptability.... hellip; One of the main features of dot net 3.... The rigorous application of an n-tiered approach to web application development using dot net satisfies item #4 above.... The CLR is located in what is known as “assemblies”, which can be considered as similar to DLLs, in that assemblies are stored in the Portable Executable (PE) format, common on the Windows platform for all DLL and EXE files....
10 Pages (2500 words) Essay

The Role of the Command Line Interface in Modern Computing Operating Systems

… The paper "The Role of the CLI in Modern Computing Operating Systems" is a good example of a literature review on information technology.... nbsp;Despite many terms used by scholars such as 'text interface' and 'command screen,' among other terms to describe the command-line interface (CLI), it is a user interface that involves typing commands in a given computer operating system....
11 Pages (2750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us