12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Securing Aspect Composition
View graph of relations

« Back

Securing Aspect Composition

Research output: Contribution in Book/Report/ProceedingsConference contribution

Published

Publication date2008
Host publicationProceedings of the 2008 ACM Symposium on Applied Computing
Place of publicationNew York
PublisherACM
Pages278-279
Number of pages2
ISBN (Print)9781595937537
Original languageEnglish

Conference

Conference23rd Annual ACM Symposium on Applied Computing
CityFortaleza
Period16/03/0820/03/08

Conference

Conference23rd Annual ACM Symposium on Applied Computing
CityFortaleza
Period16/03/0820/03/08

Abstract

Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.