Proceedings of the 3rd Workshop on Modularity in Systems Software 2013
DOI: 10.1145/2451613.2451616
|View full text |Cite
|
Sign up to set email alerts
|

Aspectizing JavaScript security

Abstract: Abstract. In this position paper we argue that aspects are wellsuited to describe and implement a range of strategies to make secure JavaScript-based applications. To this end, we review major categories of approaches to make client-side applications secure and discuss uses of aspects that exist for some of them. We also propose aspect-based techniques for the categories that have not yet been studied. We give examples of applications where aspects are useful as a general means to flexibly express and implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Other approaches, such as [14],implement a risk management analysis in order to incorporate security into the SDLC. Other related works such as [27][28][29][30][31][32]have attempted to improve security by using AOP at the SDLC implementation stage. Moreover, among these works [27] and [28] have also proposed a method to integrate security using AOP at the implementation stage, while [29] and [30] have investigated aspectizing security at the programming stage.…”
Section: 4aspect-oriented Modelling For Representing and Integratimentioning
confidence: 99%
See 1 more Smart Citation
“…Other approaches, such as [14],implement a risk management analysis in order to incorporate security into the SDLC. Other related works such as [27][28][29][30][31][32]have attempted to improve security by using AOP at the SDLC implementation stage. Moreover, among these works [27] and [28] have also proposed a method to integrate security using AOP at the implementation stage, while [29] and [30] have investigated aspectizing security at the programming stage.…”
Section: 4aspect-oriented Modelling For Representing and Integratimentioning
confidence: 99%
“…Other related works such as [27][28][29][30][31][32]have attempted to improve security by using AOP at the SDLC implementation stage. Moreover, among these works [27] and [28] have also proposed a method to integrate security using AOP at the implementation stage, while [29] and [30] have investigated aspectizing security at the programming stage. Additionally, [31] and [32] have considered using AO Ponly during the programming stage to ensure that the system is trustworthy during the development process.Generally, less attention has been given to utilizing the benefits of AO and its related concepts for other (earlier)SDLC stages as a means to improve the security of software.…”
Section: 4aspect-oriented Modelling For Representing and Integratimentioning
confidence: 99%
“…Other approaches, such as [14], implement a risk management analysis in order to incorporate security into the SDLC. Other related works such as [27][28][29][30][31][32] have attempted to improve security by using AOP at the SDLC implementation stage. Moreover, among these works [27] and [28] have also proposed a method to integrate security using AOP at the implementation stage, while [29] and [30] have investigated aspectizing security at the programming stage.…”
Section: Aspect-oriented Modelling For Representing and Integrating Smentioning
confidence: 99%
“…Other related works such as [27][28][29][30][31][32] have attempted to improve security by using AOP at the SDLC implementation stage. Moreover, among these works [27] and [28] have also proposed a method to integrate security using AOP at the implementation stage, while [29] and [30] have investigated aspectizing security at the programming stage. Additionally, [31] and [32] have considered using AOP only during the programming stage to ensure that the system is trustworthy during the development process.…”
Section: Aspect-oriented Modelling For Representing and Integrating Smentioning
confidence: 99%
“…The AOP paradigm allows us to separate the core functionality developed by a programmer from the policy specified by a security expert [50]. Furthermore, the literature on providing IFC through a library [29,31,34,56] has already hinted that AOP techniques could be used to implement IFC.…”
Section: Introductionmentioning
confidence: 99%