Enforcing Access Control Models in System Applications by using Aspect-Oriented Programming: A Literature Review

被引:1
作者
Thulnoon, Akeel A. [1 ,2 ]
Kifayat, Kashif [3 ,4 ]
机构
[1] Univ Anbar, Coll Comp, Ramadi, Iraq
[2] LJMU, Comp Sci, Liverpool, Merseyside, England
[3] LJMU, Comp Sci Dept, Liverpool, Merseyside, England
[4] Cyber Secur, Liverpool, Merseyside, England
来源
2017 10TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2017) | 2017年
关键词
Aspect-Oriented Programming; Access control; Security;
D O I
10.1109/DeSE.2017.35
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although software developers look to the security concept as a non-functional side of application systems they don't deny that this side represents one of the main pillars used to support the functional side of the applications, thus, increasing the recommendations of the application systems after achievement of user satisfaction. Unauthorized access to information represents one of the most important challenges faced by application systems developers. The privacy-preserving and security concepts have arisen from the usage of data resources, which sometimes leads to the sharing of personal identifying information (PII). Access control is one widely accepted security solution, by restricting the accessing of the data only to authorized users. Adding or updating access control concerns in system applications represents a difficult task for system developers because they need to track all program codes to detect where restriction methods should be inserted. At the same time, they have to define which piece of code needs to be applied for different access control policies. All of these concerns are accumulated in the problem of scattering and tangling of system software. A widely suggested but under-used solution to these problems is that of Aspect Oriented Programming (AOP). AOP is an effective technique for modularizing concerns and changing the execution behavior of existing codes with only the minimal need to change existing software implementations. In this paper we present a literature review in access control methods which used AOP to apply security concepts into application systems. Through our narration of the methods, we show the advantage of using AOP to modularize the access control policies and security concerns, and therefore increase the clarity, maintainability and reusability of system software.
引用
收藏
页码:100 / 105
页数:6
相关论文
共 31 条
  • [1] Betgé-Brezetz S, 2013, IEEE INT CONF CL NET, P25, DOI 10.1109/CloudNet.2013.6710554
  • [2] A transformation contract to generate aspects from access control policies
    Braga, Christiano
    [J]. SOFTWARE AND SYSTEMS MODELING, 2011, 10 (03) : 395 - 409
  • [3] Chen K, 2005, LECT NOTES COMPUT SC, V3439, P156
  • [4] Chen K., 2005, SOFTW ENG PROP LANG, P1
  • [5] Chen K, 2007, PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P3016
  • [6] Enforcement of Purpose Based Access Control within Relational Database Management Systems
    Colombo, Pietro
    Ferrari, Elena
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) : 2703 - 2716
  • [7] ELMANZALAWY Y, ASPECT ORIENTED PROG
  • [8] From research to operations: Integrating components with an aspect-oriented framework and ontology
    Fletcher, DP
    Akkawi, F
    Alena, RL
    Duncavage, DP
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3064 - 3078
  • [9] Applying dynamic separation of aspects to distributed systems security: a case study
    Garcia, M.
    Llewellyn-Jones, D.
    Ortin, F.
    Merabti, M.
    [J]. IET SOFTWARE, 2012, 6 (03) : 231 - 248
  • [10] Hazaa M., 2009, GCC C, P1