Designing high integrity systems using aspects
Integrity and internal control in information systems V
Verifiable composition of access control and application features
Proceedings of the tenth ACM symposium on Access control models and technologies
A middleware-transparent approach to developing distributed applications: Research Articles
Software—Practice & Experience
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Aspect-oriented specification of threat-driven security requirements
International Journal of Computer Applications in Technology
Automated analysis of security-design models
Information and Software Technology
An aspect-oriented methodology for designing secure applications
Information and Software Technology
A model-based aspect-oriented framework for building intrusion-aware software systems
Information and Software Technology
Secure Method Calls by Instrumenting Bytecode with Aspects
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Service level agreements: web services and security
ICWE'07 Proceedings of the 7th international conference on Web engineering
COORDINATION'08 Proceedings of the 10th international conference on Coordination models and languages
Probabilistic aspects: checking security in an imperfect world
TGC'10 Proceedings of the 5th international conference on Trustworthly global computing
A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Modeling and enforcing invariants of dynamic software architectures
Software and Systems Modeling (SoSyM)
A practical aspect framework for enforcing fine-grained access control in web applications
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Directives for composing aspect-oriented design class models
Transactions on Aspect-Oriented Software Development I
RDyMASS: reliable and dynamic enforcement of security policies for mobile agent systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Improving security design patterns with aspect-oriented strategies
Proceedings of the 50th Annual Southeast Regional Conference
A metamodel-based approach for analyzing security-design models
MODELS'07 Proceedings of the 10th international conference on Model Driven Engineering Languages and Systems
Hi-index | 0.00 |
Developers of complex systems have to addressconcerns such as security, availability of services, andtimeliness that often are non-orthogonal to traditionaldesign structures, that is, the concerns cross-cuttraditional design units. In this paper we illustrate how anaspect-oriented approach to modeling allows developersto encapsulate such design concerns so that they can bewoven into a design in a systematic and consistentmanner. The paper focuses on the use of aspects formodeling and weaving in security concerns.