Nowadays secure programming becomes more important due to security- flaws can occur in all phases of software lifecycle. The new Aspect-oriented programming (AOP) methodology facilitates modularizations of crosscutting concerns, which has been recognized as has great potential when it comes to apply security to software development compare to traditional Object-oriented programming (OOP). The aim of this thesis is to analyze how AOP can be used to avoid the security problem in the phase of the software development, demonstrating and comparing the conventional way and AOP way by some small examples with Java. By adding AOP security approach to one existing project is to demonstrate questions defined below. Firstly, the application sho...
NORSK: God programmering er essensielt hvis vi ønsker sikker programvare. Sikkerhetshull kan oppstå...
Adding security functions in existing Web application servers is now vital for the IS of companies a...
International audienceThe secure deployment of an application requires the definition of the securit...
Aspect-oriented programming represents a –if not the most – promising approach to improve the softwa...
In the last few years several new programming techniques for achieving a better separation of conce...
Computer security is nowadays a very important field in computer science and security hardening of a...
New emerging developments to build robust software, such as generative programming, domain specific ...
Aspect-Oriented Programming represents a (if not the most) promising approach to improve the softwa...
Abstract-The code to implement systemic or non-functional features of software (like logging, securi...
In this paper, we present an approach revolving around aspect-oriented software development (AOSD) f...
In the past 10 years, the research community has produced a significant number of design notations t...
Recently, the need to improve the security of software has become a key issue for developers. The se...
The idea of business driven, good enough security for distributed software applications is promising...
The problem of code scattering and tangling is very common among sizeable applications. These result...
International audienceIt is inevitable that some concerns crosscut a sizeable application, resulting...
NORSK: God programmering er essensielt hvis vi ønsker sikker programvare. Sikkerhetshull kan oppstå...
Adding security functions in existing Web application servers is now vital for the IS of companies a...
International audienceThe secure deployment of an application requires the definition of the securit...
Aspect-oriented programming represents a –if not the most – promising approach to improve the softwa...
In the last few years several new programming techniques for achieving a better separation of conce...
Computer security is nowadays a very important field in computer science and security hardening of a...
New emerging developments to build robust software, such as generative programming, domain specific ...
Aspect-Oriented Programming represents a (if not the most) promising approach to improve the softwa...
Abstract-The code to implement systemic or non-functional features of software (like logging, securi...
In this paper, we present an approach revolving around aspect-oriented software development (AOSD) f...
In the past 10 years, the research community has produced a significant number of design notations t...
Recently, the need to improve the security of software has become a key issue for developers. The se...
The idea of business driven, good enough security for distributed software applications is promising...
The problem of code scattering and tangling is very common among sizeable applications. These result...
International audienceIt is inevitable that some concerns crosscut a sizeable application, resulting...
NORSK: God programmering er essensielt hvis vi ønsker sikker programvare. Sikkerhetshull kan oppstå...
Adding security functions in existing Web application servers is now vital for the IS of companies a...
International audienceThe secure deployment of an application requires the definition of the securit...