AspectJ for Multilevel Security
暂无分享,去创建一个
[1] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[2] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[3] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[4] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[5] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[6] Daniel G. Bobrow,et al. Book review: The Art of the MetaObject Protocol By Gregor Kiczales, Jim des Rivieres, Daniel G. and Bobrow(MIT Press, 1991) , 1991, SGAR.
[7] Urs Hölzle,et al. Integrating Independently-Developed Components in Object-Oriented Languages , 1993, ECOOP.
[8] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[9] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[10] Stanley M. Sutton,et al. N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[11] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[12] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[13] Daniel P. Friedman,et al. Aspect-Oriented Programming is Quantification and Obliviousness , 2000 .
[14] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[15] William G. Griswold,et al. An Overview of AspectJ , 2001, ECOOP.
[16] Mehmet Aksit,et al. Composing Multiple Concerns Using Composition Filters , 2001 .
[17] Wouter Joosen,et al. Dynamic and selective combination of extensions in component-based applications , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[18] Robert Hirschfeld,et al. Aspect-Oriented Programming with AspectS , 2002 .
[19] G. Kiczales,et al. Design pattern implementation in Java and aspectJ , 2002, OOPSLA '02.
[20] Gregor Kiczales,et al. Design pattern implementation in Java and aspectJ , 2002, OOPSLA '02.
[21] Ian Welch,et al. Re-engineering Security as a Crosscutting Concern , 2003, Comput. J..
[22] Wouter Joosen,et al. AOSD & Security: a practical assessment , 2003 .
[23] Ramnivas Laddad,et al. Aspectj in Action: Practical Aspect-Oriented Programming , 2003 .
[24] Joseph D. Gradecki,et al. Mastering AspectJ: Aspect-Oriented Programming in Java , 2003 .
[25] Wayne Salamon,et al. Implementing SELinux as a Linux Security Module , 2003 .
[26] Chris Vance,et al. The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 , 2003, USENIX Annual Technical Conference, FREENIX Track.
[27] Mehmet Aksit,et al. Principles and Design Rationale of Composition Filters , 2004 .
[28] Wouter Joosen,et al. Developing secure applications through aspect-oriented programming , 2004 .