Enforcing Access Control Models in System Applications by using Aspect-Oriented Programming: A Literature Review

被引:1
作者
Thulnoon, Akeel A. [1 ,2 ]
Kifayat, Kashif [3 ,4 ]
机构
[1] Univ Anbar, Coll Comp, Ramadi, Iraq
[2] LJMU, Comp Sci, Liverpool, Merseyside, England
[3] LJMU, Comp Sci Dept, Liverpool, Merseyside, England
[4] Cyber Secur, Liverpool, Merseyside, England
来源
2017 10TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2017) | 2017年
关键词
Aspect-Oriented Programming; Access control; Security;
D O I
10.1109/DeSE.2017.35
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although software developers look to the security concept as a non-functional side of application systems they don't deny that this side represents one of the main pillars used to support the functional side of the applications, thus, increasing the recommendations of the application systems after achievement of user satisfaction. Unauthorized access to information represents one of the most important challenges faced by application systems developers. The privacy-preserving and security concepts have arisen from the usage of data resources, which sometimes leads to the sharing of personal identifying information (PII). Access control is one widely accepted security solution, by restricting the accessing of the data only to authorized users. Adding or updating access control concerns in system applications represents a difficult task for system developers because they need to track all program codes to detect where restriction methods should be inserted. At the same time, they have to define which piece of code needs to be applied for different access control policies. All of these concerns are accumulated in the problem of scattering and tangling of system software. A widely suggested but under-used solution to these problems is that of Aspect Oriented Programming (AOP). AOP is an effective technique for modularizing concerns and changing the execution behavior of existing codes with only the minimal need to change existing software implementations. In this paper we present a literature review in access control methods which used AOP to apply security concepts into application systems. Through our narration of the methods, we show the advantage of using AOP to modularize the access control policies and security concerns, and therefore increase the clarity, maintainability and reusability of system software.
引用
收藏
页码:100 / 105
页数:6
相关论文
共 31 条
  • [11] Dynamic Security Policies Enforcement and Adaptation using Aspects
    Idrees, Muhammad Sabir
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1374 - 1379
  • [12] Aspect-based Enforcement of Formal Delegation Policies
    Kallel, Slim
    Mezini, Mira
    Charfi, Anis
    Jmaiel, Mohamed
    [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 9 - +
  • [13] Kiczales G, 1997, LECT NOTES COMPUT SC, V1241, P220, DOI 10.1007/BFb0053381
  • [14] Koirala S., 2014, INTRO ASPECT ORIENTE
  • [15] Kotrappa S., 2010, Proceedings of 2010 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2010), P369, DOI 10.1109/ARTCom.2010.87
  • [16] Laddad R, 2002, I WANT MY AOP 1
  • [17] LaPadula L. J., 1973, DATA BASE, P29
  • [18] Li X., 2005, FINE GRANULARITY ACC, P391
  • [19] Shamon:: A system for distributed mandatory access control
    McCune, Jonathan M.
    Jaeger, Trent
    Berger, Stefan
    Caceres, Ramon
    Sailer, Reiner
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 23 - +
  • [20] Pavlich-Mariscal J, 2005, LECT NOTES COMPUT SC, V3713, P537, DOI 10.1007/11557432_41