Design pattern implementation in Java and aspectJ
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Using Aspects to Design a Secure System
ICECCS '02 Proceedings of the Eighth International Conference on Engineering of Complex Computer Systems
Summarization of dynamic content in web collections
PKDD '04 Proceedings of the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases
Towards a catalog of aspect-oriented refactorings
Proceedings of the 4th international conference on Aspect-oriented software development
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Crosscutting Concerns in J2EE Applications
WSE '05 Proceedings of the Seventh IEEE International Symposium on Web Site Evolution
An Analysis of the Security Patterns Landscape
ICSEW '07 Proceedings of the 29th International Conference on Software Engineering Workshops
On the Contributions of an End-to-End AOSD Testbed
ICSEW '07 Proceedings of the 29th International Conference on Software Engineering Workshops
Facilitating software extension with design patterns and Aspect-Oriented Programming
Journal of Systems and Software
Extending UML for Aspect-Oriented Architecture Modeling
IWCSE '09 Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 01
Quantitative evaluation of systems with security patterns using a fuzzy approach
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
Following the success of software engineering design patterns, security patterns are a promising approach to aid in the design and development of more secure software systems. At the same time, recent studies on aspect-oriented programming (AOP) suggest that software security concerns are good candidates for AOP techniques. Building upon the authors' previous work on aspectization of security patterns, this study contributes the development of aspect-oriented strategy sections for a set of web-tier security patterns. It also adds to the small but growing body of quantitative evidence on the effects of aspectization on the modularity of security pattern code.