Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Securing Aspect Composition
AU - Camilleri, Andrew
AU - Blair, Lynne
AU - Coulson, Geoffrey
PY - 2008
Y1 - 2008
N2 - Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.
AB - Although research in AOP is increasing in maturity there remain many unresolved issues. While current AOP languages offer ever-increasing levels of flexibility, they still fail to offer a sufficient discipline of application to ensure that advanced AOP facilities are used safely and appropriately. Researchers have recognised the need to control aspect composition and have started to explore mechanisms to achieve this [2, 3, 4, 5]. In this paper we aim to provide a novel approach to control aspect composition (using AspectJ as reference) and we employ the concept of roles from Role Based Access Control Models [1] to characterise aspects in terms of both their internal behaviour and their external composition. Then, using policies, we express invariants and constraints on the associated advice and pointcuts.
KW - aspect oriented programming
KW - security
KW - role based access control models
KW - software engineering
U2 - 10.1145/1363686.1363757
DO - 10.1145/1363686.1363757
M3 - Conference contribution/Paper
SN - 9781595937537
SP - 278
EP - 279
BT - Proceedings of the 2008 ACM Symposium on Applied Computing
PB - ACM
CY - New York
T2 - 23rd Annual ACM Symposium on Applied Computing
Y2 - 16 March 2008 through 20 March 2008
ER -