Toggle Main Menu Toggle Search

Open Access padlockePrints

Re-engineering security as a crosscutting concern

Lookup NU author(s): Ian Welch, Dr Robert Stroud


Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


We have re-engineered a third-party application using a reflective security architecture that allows security to be treated as a crosscutting concern. This has resulted in a considerable reduction in tangling between application code and security code. Prior to the re-engineering, the application was secured using a conventional approach based upon the application of inheritance and the proxy pattern, and we are thus able to compare both approaches. Our experience highlights some general points that are applicable to any attempt to engineer security using advanced separation of concerns technology and some possible improvements to Kava, used to implement the crosscutting concerns.

Publication metadata

Author(s): Welch IS, Stroud RJ

Publication type: Article

Publication status: Published

Journal: Computer Journal

Year: 2003

Volume: 46

Issue: 5

Pages: 578-589

ISSN (print): 0010-4620

ISSN (electronic): 1460-2067

Publisher: Oxford University Press


DOI: 10.1093/comjnl/46.5.578


Altmetrics provided by Altmetric