A Secure and Integrated Approach to Software Code and Docker Image Signing: Introducing the Hybrid Chain of Trust (HCoT) Algorithm

Authors

  • Jamshir Qureshi1* 1Purdue University Global, West Lafayette, IN, USA, 47906.

DOI:

https://doi.org/10.51483/IJAIML.5.2.2025.16-22

Keywords:

HCoT algorithm, Securing software, AI facilitated code, Vulnerabilities, Integrity of code

Abstract

Securing the software supply chain is critical in an increasingly interconnected
development environment, and vulnerabilities can have implications at a
widespread level. Hybrid Chain of Trust (HCoT) algorithm, a proposed new
solution, integrates cutting-edge technology to address such concerns. AIfacilitated
code analysis in HCoT identifies a broader range of vulnerabilities
compared to traditional methods. HCoT simplifies workflows through
aggregation of code and image signatures under a single, unified process. HCoT
also introduces transparency to the software delivery pipeline through having
recordable, verifiable proofs of vulnerability and integrity of code. With these,
security professionals and developers can make trust in software delivered to
them a reality.

Downloads

Published

2025-07-25

How to Cite

Jamshir Qureshi1*. (2025). A Secure and Integrated Approach to Software Code and Docker Image Signing: Introducing the Hybrid Chain of Trust (HCoT) Algorithm. International Journal of Artificial Intelligence and Machine Learning, 5(02), 16–22. https://doi.org/10.51483/IJAIML.5.2.2025.16-22

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.