In this paper, we address the problems related to the applicability and usability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, specification and deployment. Our approach allows the security experts to deliver their security patterns that describe the steps and actions required for security solutions, including detailed information on how and where to integrate each one. It also provides the pattern users with the capabilities to deploy well-defined security solutions. The pattern users are required to have knowledge in AOP with minimal expertise in the corresponding security solution domain. Moreover, we design and implement the RBAC (Role Base...
Access control (AC) limits access to the resources of a system only to authorized entities. Given th...
We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechan...
Nowadays secure programming becomes more important due to security- flaws can occur in all phases of...
Abstract. Many of today’s software applications require a high-level of security, defined by a detai...
Following the success of software engineering design patterns, security patterns are a promising app...
Organizations define and enforce AC policies to protect sensitive information resources. The policy ...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
Security system designs are required to be flexible enough to support multiple policies. A security ...
We present in this paper a novel approach to non-functional safety properties, combining formal meth...
International audienceCurrent social network systems support a large range of applications with very...
The important for Security system designs are required to be flexible enough to support multiple pol...
International audienceContext: Nowadays, Information Systems (IS) are at the heart of most companies...
In this paper, we present an approach revolving around aspect-oriented software development (AOSD) f...
Computer security is nowadays a very important field in computer science and security hardening of a...
Access control (AC) limits access to the resources of a system only to authorized entities. Given th...
We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechan...
Nowadays secure programming becomes more important due to security- flaws can occur in all phases of...
Abstract. Many of today’s software applications require a high-level of security, defined by a detai...
Following the success of software engineering design patterns, security patterns are a promising app...
Organizations define and enforce AC policies to protect sensitive information resources. The policy ...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
Security system designs are required to be flexible enough to support multiple policies. A security ...
We present in this paper a novel approach to non-functional safety properties, combining formal meth...
International audienceCurrent social network systems support a large range of applications with very...
The important for Security system designs are required to be flexible enough to support multiple pol...
International audienceContext: Nowadays, Information Systems (IS) are at the heart of most companies...
In this paper, we present an approach revolving around aspect-oriented software development (AOSD) f...
Computer security is nowadays a very important field in computer science and security hardening of a...
Access control (AC) limits access to the resources of a system only to authorized entities. Given th...
We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechan...
Nowadays secure programming becomes more important due to security- flaws can occur in all phases of...