Home > Research > Publications & Outputs > Securing Aspect Composition
View graph of relations

Securing Aspect Composition

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date2008
Host publicationProceedings of the 2008 ACM Symposium on Applied Computing
Place of PublicationNew York
PublisherACM
Pages278-279
Number of pages2
ISBN (print)9781595937537
<mark>Original language</mark>English
Event23rd Annual ACM Symposium on Applied Computing - Fortaleza
Duration: 16/03/200820/03/2008

Conference

Conference23rd Annual ACM Symposium on Applied Computing
CityFortaleza
Period16/03/0820/03/08

Conference

Conference23rd Annual ACM Symposium on Applied Computing
CityFortaleza
Period16/03/0820/03/08

Abstract

Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.