Patterns for Re-usable Aspects in Object Teams

Aspect-oriented software development still lacks practical evidence. While aspects are claimed to be useful in adapting existing applications there is also first evidence that they might themselves be re-usable. We present results from two case studies with the aspect-oriented programming language ObjectTeams/Java that investigate the re-usability of aspects in developing a security framework. During the development of the framework we have identified patterns for re-usable aspects that increase the flexibility when applying a framework to a given application.

[1]  Shirley Dex,et al.  JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .

[2]  Mira Mezini,et al.  Conquering aspects with Caesar , 2003, AOSD '03.

[3]  Ramnivas Laddad,et al.  Aspectj in Action: Practical Aspect-Oriented Programming , 2003 .

[4]  Daniel P. Friedman,et al.  Aspect-Oriented Programming is Quantification and Obliviousness , 2000 .

[5]  Jan Bosch,et al.  Framework integration problems, causes, solutions , 1999, CACM.

[6]  Mira Mezini,et al.  Programming with Aspectual Components , 1999 .

[7]  Stefan Hanenberg,et al.  Applying Aspect-Oriented Composition to Framework Development { A Case Study , 2004 .

[8]  William G. Griswold,et al.  An Overview of AspectJ , 2001, ECOOP.

[9]  Wim Vanderperren,et al.  JAsCo: an aspect-oriented approach tailored for component based software development , 2003, AOSD '03.

[10]  Wouter Joosen,et al.  View connectors for the integration of domain specific access control , 2005 .

[11]  Lufeng Zhang,et al.  Toward a Reusable and Generic Security Aspect Library , 2004 .

[12]  Krzysztof Zielinski,et al.  Comparison Study of Aspect-oriented and Container Managed Security , 2003 .

[13]  Stanley M. Sutton,et al.  N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[14]  Stephan Herrmann,et al.  Object Teams: Improving Modularity for Crosscutting Collaborations , 2002, NetObjectDays.

[15]  Pete Thomas,et al.  Evolution of aspects for legacy system security concerns , 2004 .

[16]  Erik Ernst,et al.  Family Polymorphism , 2001, ECOOP.

[17]  Wouter Joosen,et al.  Implementing a modular access control service to support application-specific policies in CaesarJ , 2005, AOMD '05.

[18]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.