Dataflow Pointcut for Integrity Concerns
暂无分享,去创建一个
[1] Larry Wall,et al. Programming Perl , 1991 .
[2] Karl Lieberherr,et al. Adaptive Object-Oriented Software: The Demeter Method with Propagation Patterns , 1995 .
[3] William G. Griswold,et al. An Overview of AspectJ , 2001, ECOOP.
[4] Jan Vitek,et al. Confined types , 1999, OOPSLA '99.
[5] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] Robert J. Walker,et al. Implicit context: easing software evolution and reuse , 2000, SIGSOFT '00/FSE-8.
[8] Kris Gybels,et al. Arranging language features for more robust pattern-based crosscuts , 2003, AOSD '03.
[9] Bart De Decker,et al. Security Through Aspect-Oriented Programming , 2001, Network Security.
[10] Robert J. Walker,et al. Joinpoints as Ordered Events: Towards Applying Implicit Context to Aspect-Orientation , 2001 .
[11] Hidehiko Masuhara,et al. Dataflow Pointcut in Aspect-Oriented Programming , 2003, APLAS.
[12] Karl J. Lieberherr,et al. Aspect-oriented programming with adaptive methods , 2001, CACM.