2003
DOI: 10.21236/ada419305
|View full text |Cite
|
Sign up to set email alerts
|

An Aspect-Oriented Security Assurance Solution

Abstract: Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Many contributions (Shah, 2003;Dewin, 2004;Bodkin, 2004;Huang et al, 2004) in addition to our experiments , have proven the usefulness of AOP for integrating security features into software. In this context, we present in this section a methodology to develop the security solutions and their corresponding aspects and patterns based on AOP.…”
Section: Approach Overviewmentioning
confidence: 53%
“…Many contributions (Shah, 2003;Dewin, 2004;Bodkin, 2004;Huang et al, 2004) in addition to our experiments , have proven the usefulness of AOP for integrating security features into software. In this context, we present in this section a methodology to develop the security solutions and their corresponding aspects and patterns based on AOP.…”
Section: Approach Overviewmentioning
confidence: 53%
“…Few contributions that discuss and explore the relevance of AOP and AOP languages for integrating security code into applications have been published recently (Bodkin, 2004;DeWin, 2004;Huang et al, 2004;Shah, 2003;Xu et al, 2006). These research initiatives presented mainly as case studies, however, focus on exploring the usefulness of AOP for securing software by security experts who know exactly where each piece of code should be manually injected and/ or proposing AOP languages for security.…”
Section: Aop Approaches For Security Injectionmentioning
confidence: 99%
“…Cigital labs proposed an AOP language called CSAW (Shah, 2003;Shah andHill, 2002, 2003;Viega et al, 2001), which is a small superset of C programming language. Their work is mostly dedicated to improve the security of C programs.…”
Section: Aop Approaches For Security Injectionmentioning
confidence: 99%
“…Most of the contributions (Bodkin, 2004;DeWin, 2004;Huang et al, 2004;Shah, 2003) that explore the usability of AOP for integrating security code into applications are presented as case studies that show the relevance of AOP languages for application security. They have focused on exploring the usefulness of AOP for securing software by security experts who know exactly where each piece of code should be manually injected.…”
Section: Aop Approaches For Security Injectionmentioning
confidence: 99%
“…One way of addressing such problems is by separating out the security concerns from the rest of the application, such that they can be addressed independently and applied globally. More recently, several proposals have been advanced for code injection, via an aspect-oriented computational style, into source code for the purpose of improving its security (Bodkin, 2004;DeWin, 2004;Huang et al, 2004;Shah, 2003). Aspect-Oriented Programming (AOP) is an appealing approach that allows the separation of crosscutting concerns.…”
Section: Introductionmentioning
confidence: 99%