Improving Network Security using Aspect Oriented Programming
Downloads
System security is critical in many modern software applications, yet there are many examples of system with little or no effective security in place. Modern computer System provides the most effective tool that the world uses for communication and exchange of information. Security of these applications is essinial ,but many are used to get to data without effective security. It is basic for system architects to ensure that the system is secuere as possible. Software designers need to insert or execute security in their applications. Security can be effectively implemented before the phases of the product improvement process, yet some designers for the most part ignore the security functionalities of their framework. System security issues include ways which program security influences overall system security. This paper concentrates on the ways in which Aspect-Oriented Programming (AOP) can be utilized to incorporate security into such software. The way security is actualized utilizing Aspect Oriented Programming is described, as is an approach to decrease the complexity of the program by permitting programming engineers to include security after the underlying program improvement stage is done.
Viega, J., Bloch, J. & Chandra, P., 2001.Applying
aspect-oriented programming to security. Cutter IT
Journal, 14 (2), pp. 31–39.
Gradecki, J.D. &Lesiecki, N., 2003. Mastering AspectJ:
aspect-oriented programming in Java, John Wiley &
Sons.
Shah, V. & Hill, F., 2003.An aspect-oriented security
framework.In DARPA Information Survivability
Conference and Exposition, 2003.Proceedings. pp.
–145.
Odersky, M., 2004. ECOOP 2004-Object-Oriented
Programming: 18th European Conference, Oslo,
Norway, June 14-18, 2004, Proceedings, Springer
Science & Business Media.
Sirbi, K. &Kulkarni, P.J., 2010.Stronger enforcement of
security using aop and spring aop.arXiv preprint
arXiv:1006.4550.
Jones, M. &Hamlen, K.W., 2010.Disambiguating
aspect-oriented security policies. In Proceedings of the
th International Conference on Aspect-Oriented
Software Development. pp. 193–204.
Laddad, R., 2003. AspectJ in action: practical
aspect-oriented programming, Dreamtech Press.
Kiczales, G. et al., 2001.An overview of AspectJ.In
European Conference on Object-Oriented Programming.
pp. 327–354.
Alhadidi, D., Belblidia, N. &Debbabi, M., 2006.AspectJ
assessment from a security perspective.Concordia
Institute for Information Systems Engineering
Concordia University, Montreal, Quebec, Canada.
Spinczyk, O., Gal, A. &Schrӧder-Preikschat, W.,
AspectC++: an aspect-oriented extension to the
C++ programming language. In Proceedings of the
Fortieth International Conference on Tools Pacific:
Objects for internet, mobile and embedded applications.
pp. 53–60.
Colyer, A. et al., 2004. Eclipse aspectj: aspect-oriented
programming with aspectj and the eclipse aspectj
development tools, Addison-Wesley Professional.
Xia, L. & HUANG, H., 2008.Research and
implementation of permission management based on
Acegi security framework [J].Railway Computer
Application, 6, p.002.
Courbis, C. & Finkelstein, A., 2005.Towards aspect
weaving applications.In Proceedings.27th International
Conference on Software Engineering, 2005. ICSE 2005.
pp. 69–77.
Mularien, P., 2010. Spring Security 3, Packt Publishing
Ltd.
Viega, J. &Voas, J., 2000.Can aspect-oriented
programming lead to more reliable software?IEEE
software, 17(6), p.19.
Mularien, P., 2010. Spring Security 3, Packt Publishing
Ltd.
Slowikowski, P. & Zielinski, K., 2003. Comparison
study of aspect-oriented and container managed security.
In Proceedings of the Workshop on Analysis of Aspect
Oriented Software, Germany.
All Content should be original and unpublished.