A-MVC : A security architecture on the e-business presentation layer

被引:0
|
作者
Xiao, Kun [1 ]
Chen, Shihong [1 ]
Wang, Leichun [1 ]
Xiao, Jian [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
来源
SIXTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD | 2007年
关键词
AOP; MVC; security concerns; E-business; EBPL;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
An E-Business System (EBS) communicates with outside via the E-Business presentation layer (EBPL). Many designers pay much more attention to separate the presentation layer from the business logic and ignore to secure the EBPL because they only concern the communication between the EBPL and outside. Therefore, problems about how to protect the EBPL when designing the EBS exist. The MVC architecture is selected to construct the EBPL. However in EBS development. security codes are sepreaded from everywhere in the MVC architecture. It is difficult to,encapsulate. In this paper, an Aspect Oriented Software Development (AOSD)is introduced. It illustrates the mechanism of binding the Aspect Oriented Programming (AOP) With MVC to establish A-MVC architecture. A new security solution of EBPL is presented based on A Model-View-Controller (A-MVC) architecture in this paper.
引用
收藏
页码:957 / 962
页数:6
相关论文
共 50 条
  • [41] Cross-Enterprise Policy Model for e-Business Web Services Security
    Ishaya, Tanko
    Nurse, Jason R. C.
    INFORMATION SECURITY AND DIGITAL FORENSICS, 2010, 41 : 163 - +
  • [42] E-Business Education in Transition
    Durlabhji, Subhash
    Fusilier, Marcelline
    JOURNAL OF INTERNET COMMERCE, 2005, 4 (01) : 103 - 122
  • [43] e-Business Control Systems
    Ambrosio, R
    Morrow, A
    Noecker, N
    International Conference on Computing, Communications and Control Technologies, Vol 4, Proceedings, 2004, : 91 - 96
  • [44] E-business and Sustainable Development
    Yi, Lan
    Thomas, Hywel R.
    INTERNATIONAL JOURNAL OF ENVIRONMENT AND SUSTAINABLE DEVELOPMENT, 2006, 5 (03) : 262 - 274
  • [45] CONTINUOUS AUDIT ON E-BUSINESS
    Stroe, Ion-Sorin
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 465 - 469
  • [46] The research of steganography in the E-business
    Ge, Xiuhui
    Zhang, Rongmei
    Tian, Hao
    Wang, Jiazhen
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 184 - 188
  • [47] Development of a framework for risks and security in B2C e-business
    Baird, A
    Jamieson, R
    Cerpa, N
    TOWARDS THE KNOWLEDGE SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2003, 105 : 399 - 413
  • [48] Value creation in e-business
    Amit, R
    Zott, C
    STRATEGIC MANAGEMENT JOURNAL, 2001, 22 (6-7) : 493 - 520
  • [49] Trust for e-business management
    Hossain, L
    Wigand, RT
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 893 - 900
  • [50] Applying Service-Oriented Architecture into an Augmented Reality E-business System
    Wang, Rui
    Wang, Xiangyu
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 621 - 626