Proceedings of the 12th Annual International Conference on Aspect-Oriented Software Development 2013
DOI: 10.1145/2451436.2451456
|View full text |Cite
|
Sign up to set email alerts
|

Secure and modular access control with aspects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…An around advice can invoke the original computation of the matched join point, known as the proceed invocation. Examples of crosscutting behaviors that can be modularized using aspects are security [Toledo and Tanter, 2013], logging [Miles, 2004], and event handling [Leger et al, 2013].…”
Section: Use Of Aspects In Sync/ccmentioning
confidence: 99%
“…An around advice can invoke the original computation of the matched join point, known as the proceed invocation. Examples of crosscutting behaviors that can be modularized using aspects are security [Toledo and Tanter, 2013], logging [Miles, 2004], and event handling [Leger et al, 2013].…”
Section: Use Of Aspects In Sync/ccmentioning
confidence: 99%
“…Therefore, our approach can be adapted to use with other security models, e.g., Modular Access Control (ModAC) (Toledo et al, 2012), or Ponder Policy Specification Language (Damianou et al, 2001), by defining the relation between the security policies and the security functionalities to be deployed and the security properties to be monitored. For instance, the use of ModAC instead of OrBAC facilitates the encapsulation of the access control functionality as an aspect (Toledo and Tanter, 2013). However, obligation rules provided by OrBAC allow specifying requirements for any kind of functionality (e.g., encryption, integrity), not only access control functionality.…”
Section: Security Frameworkmentioning
confidence: 99%
“…AOP has been used to implement security features: access control [37,47], error detection and handling [28], automatic login [51], hardening the security of existing libraries [32] or preventing buffer overflow [43] are some examples where AOP has been used successfully. AOP proves itself a useful and powerful tool as it allows the expression of security concerns that should apply to the whole application while completely decoupling their specification from the application functionality.…”
Section: Related Work 71 Aspect Oriented Programmingmentioning
confidence: 99%