A-MVC : A security architecture on the e-business presentation layer

被引:0
|
作者
Xiao, Kun [1 ]
Chen, Shihong [1 ]
Wang, Leichun [1 ]
Xiao, Jian [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
来源
SIXTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD | 2007年
关键词
AOP; MVC; security concerns; E-business; EBPL;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
An E-Business System (EBS) communicates with outside via the E-Business presentation layer (EBPL). Many designers pay much more attention to separate the presentation layer from the business logic and ignore to secure the EBPL because they only concern the communication between the EBPL and outside. Therefore, problems about how to protect the EBPL when designing the EBS exist. The MVC architecture is selected to construct the EBPL. However in EBS development. security codes are sepreaded from everywhere in the MVC architecture. It is difficult to,encapsulate. In this paper, an Aspect Oriented Software Development (AOSD)is introduced. It illustrates the mechanism of binding the Aspect Oriented Programming (AOP) With MVC to establish A-MVC architecture. A new security solution of EBPL is presented based on A Model-View-Controller (A-MVC) architecture in this paper.
引用
收藏
页码:957 / 962
页数:6
相关论文
共 50 条
  • [1] Security features and technologies for E-business architecture design
    Chen, Hao
    Corriveau, Jean-Pierre
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1150 - +
  • [2] E-business Workflow Security Architecture based on UCON
    Wen, Haoyu
    Ji, Dongxing
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340
  • [3] A security architecture for E-business based on grid technology
    Zhou, Ning
    Zhang, Fangfang
    Yu, Xiaosheng
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1352 - 1356
  • [4] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [5] A security blueprint for e-business applications based on the three-tier architecture
    Du, J
    Jiao, JX
    Li, XD
    2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 879 - 884
  • [6] Service oriented architecture in e-business
    Zhuang, Junxi
    Li, Jian
    Zhu, Liangfeng
    Liu, Lihui
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 499 - 505
  • [7] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
  • [8] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [9] Research on the evaluation in alliance e-business security
    Lu Xi
    Zhang Xiaoyu
    Zhu Aimin
    Yu Lijuan
    2010 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING: IC4E 2010, PROCEEDINGS, 2010, : 74 - 78
  • [10] AWARENESS ON DIGITAL SECURITY AND E-BUSINESS IN NIGERIA
    Odiboh, Oscar
    Ben-Enukora, Charity
    Oresanya, Toluwalope
    Yartey, Darlington
    Aiyelabola, Ayoola
    4TH INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCES AND HUMANITIES (SOCIOINT 2017), 2017, : 1402 - 1408