2008
DOI: 10.1080/19393550801911230
|View full text |Cite
|
Sign up to set email alerts
|

A High-level Aspect-oriented-based Framework for Software Security Hardening

Abstract: In this paper, we present an aspect-oriented approach and propose a high-level language called SHL (Security Hardening Language) for the systematic security hardening of software. The primary contribution of this proposition is providing the software architects with the capabilities to perform security hardening by applying well-defined solutions and without the need to have expertise in the security solution domain. At the same time, the security hardening is applied in an organized and systematic way in orde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 10 publications
(12 reference statements)
0
7
0
Order By: Relevance
“…The initial proposition, which is detailed in (Mourad et al, 2007;Mourad et al, 2008), is composed of a framework, a language called SHL and a compiler for securing software in a systematic way. SHL is an aspect-oriented and programming-independent language.…”
Section: Weaving Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…The initial proposition, which is detailed in (Mourad et al, 2007;Mourad et al, 2008), is composed of a framework, a language called SHL and a compiler for securing software in a systematic way. SHL is an aspect-oriented and programming-independent language.…”
Section: Weaving Methodologymentioning
confidence: 99%
“…We have selected a client application implemented in C++, which allows to connect and exchange data with a server through HTTP requests. Listing 1 presents the pattern elaborated in SHL for securing the connection of the aforementioned application using GnuTL-S/SSL (Please refer to (Mourad et al, 2007;Mourad et al, 2008) for SHL structure and syntax). The code of the functions used in the Code of the pattern's Behavior(s) is illustrated in Listing 2.…”
Section: Pattern and Aspect For Securing The Connections Of Client Apmentioning
confidence: 99%
See 1 more Smart Citation
“…As alternative to XACML, several extensions such SBA-XACML and its related analysis were proposed to make the policy evaluation faster using sets based languages in [32]- [34]. Moreover, it is important to mention that the use of aspect-oriented programming may improve the model by allowing dynamic integration of the policies changes within XACML and business processes [35], [36].…”
Section: B Performance-aware Control Policiesmentioning
confidence: 99%
“…control and encryption using pointcut-based deployment. Other research has proposed even more advanced scenerios where AOSD is applied to address security [4,6,7,9,16,17,20,25,26,28]. However, most existing tools and research focus on the protection of server-side resources.…”
Section: Introductionmentioning
confidence: 98%