search query: @keyword AspectJ / total: 1
reference: 1 / 1
« previous | next »
Author: | Wang, Yecheng |
Title: | Applying Aspect Oriented Programming (AOP) to Security |
Publication type: | Master's thesis |
Publication year: | 2005 |
Pages: | vi + 69 s. + liitt. 11 Language: eng |
Department/School: | Sähkö- ja tietoliikennetekniikan osasto |
Main subject: | Ohjelmistotekniikka (T-106) |
Supervisor: | Saikkonen, Heikki |
Instructor: | Soisalon-Soininen, Eljas |
OEVS: | Electronic archive copy is available via Aalto Thesis Database.
Instructions Reading digital theses in the closed network of the Aalto University Harald Herlin Learning CentreIn the closed network of Learning Centre you can read digital and digitized theses not available in the open network. The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/ You can read theses on the Learning Centre customer computers, which are available on all floors.
Logging on to the customer computers
Opening a thesis
Reading the thesis
Printing the thesis
|
Location: | P1 Ark T80 | Archive |
Keywords: | AOP (Aspect-Oriented Programming) Software security OOP (Object-Oriented Programming) AspectJ crosscutting concerns |
Abstract (eng): | Nowadays secure programming becomes more important due to security- flaws can occur in all phases of software lifecycle. The new Aspect-oriented programming (AOP) methodology facilitates modularizations of crosscutting concerns, which has been recognized as has great potential when it comes to apply security to software development compare to traditional Object-oriented programming (OOP). The aim of this thesis is to analyze how AOP can be used to avoid the security problem in the phase of the software development, demonstrating and comparing the conventional way and AOP way by some small examples with Java. By adding AOP security approach to one existing project is to demonstrate questions defined below. Firstly, the application should not depend on the security system, so that it can be developed and maintained independently? Secondly, the security system should be built and used in such a way that it is independent of the application and it is securing? |
ED: | 2007-02-26 |
INSSI record number: 33135
+ add basket
« previous | next »
INSSI