Browse by author
Lookup NU author(s): Ian Welch, Dr Robert Stroud
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
We have re-engineered a third-party application using a reflective security architecture that allows security to be treated as a crosscutting concern. This has resulted in a considerable reduction in tangling between application code and security code. Prior to the re-engineering, the application was secured using a conventional approach based upon the application of inheritance and the proxy pattern, and we are thus able to compare both approaches. Our experience highlights some general points that are applicable to any attempt to engineer security using advanced separation of concerns technology and some possible improvements to Kava, used to implement the crosscutting concerns.
Author(s): Welch IS, Stroud RJ
Publication type: Article
Publication status: Published
Journal: Computer Journal
Year: 2003
Volume: 46
Issue: 5
Pages: 578-589
ISSN (print): 0010-4620
ISSN (electronic): 1460-2067
Publisher: Oxford University Press
URL: http://dx.doi.org/10.1093/comjnl/46.5.578
DOI: 10.1093/comjnl/46.5.578
Altmetrics provided by Altmetric