International audienceIt is inevitable that some concerns crosscut a sizeable application, resulting in code scattering and tangling. This issue is particularly severe for security-related concerns: it is difficult to be confident about the security of an application when the implementation of its security-related concerns is scattered all over the code and tangled with other concerns, making global reasoning about security precarious. In this study, we consider the case of access control in Java, which turns out to be a crosscutting concern with a non-modular implementation based on runtime stack inspection. We describe the process of modularizing access control in Java by means of Aspect-Oriented Programming (AOP). We first show a solutio...
In the last few years several new programming techniques for achieving a better separation of conce...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
International audienceAccess control is a central issue among the overall security goals of informat...
International audienceIt is inevitable that some concerns crosscut a sizeable application, resulting...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Abstract-The code to implement systemic or non-functional features of software (like logging, securi...
Nowadays secure programming becomes more important due to security- flaws can occur in all phases of...
Traditionally, access control system architectures are based on the abstract reference monitor model...
International audienceWe propose a formal method to automatically integrate security rules regarding...
aspect-oriented extension to Java enables plug-and-play implementations of crosscutting. Many softwa...
Aspect-oriented programming represents a –if not the most – promising approach to improve the softwa...
Many programs have crosscutting concerns for which neither procedural nor object-oriented programmin...
MMany software developers are attracted to the idea of AOP—theyrecognize the concept of crosscutting...
Prevailing Aspect-Oriented Programming (AOP) frameworks for Java, such as AspectJ, use bytecode inst...
Aspect-Oriented Software Development (AOSD) is a new approach that addresses limitations inherent in...
In the last few years several new programming techniques for achieving a better separation of conce...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
International audienceAccess control is a central issue among the overall security goals of informat...
International audienceIt is inevitable that some concerns crosscut a sizeable application, resulting...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Abstract-The code to implement systemic or non-functional features of software (like logging, securi...
Nowadays secure programming becomes more important due to security- flaws can occur in all phases of...
Traditionally, access control system architectures are based on the abstract reference monitor model...
International audienceWe propose a formal method to automatically integrate security rules regarding...
aspect-oriented extension to Java enables plug-and-play implementations of crosscutting. Many softwa...
Aspect-oriented programming represents a –if not the most – promising approach to improve the softwa...
Many programs have crosscutting concerns for which neither procedural nor object-oriented programmin...
MMany software developers are attracted to the idea of AOP—theyrecognize the concept of crosscutting...
Prevailing Aspect-Oriented Programming (AOP) frameworks for Java, such as AspectJ, use bytecode inst...
Aspect-Oriented Software Development (AOSD) is a new approach that addresses limitations inherent in...
In the last few years several new programming techniques for achieving a better separation of conce...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
International audienceAccess control is a central issue among the overall security goals of informat...