Home > Research > Publications & Outputs > Securing Aspect Composition
View graph of relations

Securing Aspect Composition

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Securing Aspect Composition. / Camilleri, Andrew; Blair, Lynne; Coulson, Geoffrey.
Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, 2008. p. 278-279.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Camilleri, A, Blair, L & Coulson, G 2008, Securing Aspect Composition. in Proceedings of the 2008 ACM Symposium on Applied Computing. ACM, New York, pp. 278-279, 23rd Annual ACM Symposium on Applied Computing, Fortaleza, 16/03/08. https://doi.org/10.1145/1363686.1363757

APA

Camilleri, A., Blair, L., & Coulson, G. (2008). Securing Aspect Composition. In Proceedings of the 2008 ACM Symposium on Applied Computing (pp. 278-279). ACM. https://doi.org/10.1145/1363686.1363757

Vancouver

Camilleri A, Blair L, Coulson G. Securing Aspect Composition. In Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM. 2008. p. 278-279 doi: 10.1145/1363686.1363757

Author

Camilleri, Andrew ; Blair, Lynne ; Coulson, Geoffrey. / Securing Aspect Composition. Proceedings of the 2008 ACM Symposium on Applied Computing. New York : ACM, 2008. pp. 278-279

Bibtex

@inproceedings{55f0f5c3c384447d9f43ac111cb749a7,
title = "Securing Aspect Composition",
abstract = "Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.",
keywords = "aspect oriented programming, security, role based access control models, software engineering",
author = "Andrew Camilleri and Lynne Blair and Geoffrey Coulson",
year = "2008",
doi = "10.1145/1363686.1363757",
language = "English",
isbn = "9781595937537",
pages = "278--279",
booktitle = "Proceedings of the 2008 ACM Symposium on Applied Computing",
publisher = "ACM",
note = "23rd Annual ACM Symposium on Applied Computing ; Conference date: 16-03-2008 Through 20-03-2008",

}

RIS

TY - GEN

T1 - Securing Aspect Composition

AU - Camilleri, Andrew

AU - Blair, Lynne

AU - Coulson, Geoffrey

PY - 2008

Y1 - 2008

N2 - Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.

AB - Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.

KW - aspect oriented programming

KW - security

KW - role based access control models

KW - software engineering

U2 - 10.1145/1363686.1363757

DO - 10.1145/1363686.1363757

M3 - Conference contribution/Paper

SN - 9781595937537

SP - 278

EP - 279

BT - Proceedings of the 2008 ACM Symposium on Applied Computing

PB - ACM

CY - New York

T2 - 23rd Annual ACM Symposium on Applied Computing

Y2 - 16 March 2008 through 20 March 2008

ER -