Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules representing security aspects with the requirement models. Moreover, we provide guidance on how such security aspects are structured to implement a particular access control solution. As a result, such security aspects become reusable solution patterns to refine the structure of security-related problem
The problem of code scattering and tangling is very common among sizeable applications. These result...
In the last few years several new programming techniques for achieving a better separation of conce...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
Organizations define and enforce AC policies to protect sensitive information resources. The policy ...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
Following the success of software engineering design patterns, security patterns are a promising app...
Following the success of software engineering design patterns, security patterns are a promising app...
Following the success of software engineering design patterns, security patterns are a promising app...
The methodology of aspect-oriented software engineering has been proposed to factor out concerns tha...
The methodology of aspect-oriented software engineering has been proposed to factor out concerns tha...
The important for Security system designs are required to be flexible enough to support multiple pol...
Non-functional concerns are present in all software solutions and products. While the functional req...
Aspect-Oriented Programming is gaining prominence, particularly in the area of security. There are ...
The problem of code scattering and tangling is very common among sizeable applications. These result...
In the last few years several new programming techniques for achieving a better separation of conce...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
Organizations define and enforce AC policies to protect sensitive information resources. The policy ...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
Following the success of software engineering design patterns, security patterns are a promising app...
Following the success of software engineering design patterns, security patterns are a promising app...
Following the success of software engineering design patterns, security patterns are a promising app...
The methodology of aspect-oriented software engineering has been proposed to factor out concerns tha...
The methodology of aspect-oriented software engineering has been proposed to factor out concerns tha...
The important for Security system designs are required to be flexible enough to support multiple pol...
Non-functional concerns are present in all software solutions and products. While the functional req...
Aspect-Oriented Programming is gaining prominence, particularly in the area of security. There are ...
The problem of code scattering and tangling is very common among sizeable applications. These result...
In the last few years several new programming techniques for achieving a better separation of conce...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...