Aspect-Oriented Secure Software Case Study

Improved Essays
Chapter : 5
Aspect-oriented Secure Software Modeling

Object Oriented Programming (OOP) [1] uses encapsulation and abstraction through class that captures both functionality and behavior and internal structure. In the software system development, besides the basic functionality, there are another concerns as synchronization, distribution, logging, error handling, security management, etc. If each one of these concerns are processed independently from the remaining part of the system, the adaptability, extensibility and reusability of the system would be increased, resulting in quality software being developed. To achieve this objective it is necessary that each one of these concerns being modulated inside the system. This fact assumes
…show more content…
The concepts that have been introduced by Kiczales and his research group, Aspect, Join Point, Crosscutting concerns and Weaving, constitute the core of AOP. The evolution of the Aspect-Oriented paradigm has progressed from programming towards the analysis and the design. The Aspect-Oriented Software Development (AOSD) [3] emerges naturally to promote the goal of the early separation of concerns from the implementation level towards other software development process phases, including the specification, analysis and design requirements. The Aspects-Oriented technology premise is the division of crosscutting concerns, where certain design requirements tend to cross the central functional entities group. However, some research groups have worked to introduce the use of linguistic divider mechanisms to modulate and compose crosscutting concerns, being summed up in different approaches: Adaptive Programming-AP, Composition Filters-CF, Subject-Oriented Programming-SOP and Multi-Dimensional Separation of Concerns –MDSoC. The AOP and these methods belong to a bigger research field known as Advanced Separation of Concerns-ASoC [4]. The methods related with ASoC propose different and assorted …show more content…
The concerns that (at the design or implementation phases) are spread over several modular units (crossing the limits of these units) are named crosscutting-concerns. This crosscutting complicates the development activities, the evolution, and the maintenance of the software. For this reason, a special modular unit that contains the crosscutting-concerns (known as aspects) was proposed in [1]. With regard to Secure Software Architecture (SSA), the aspects involved are called early security aspects [2]. The identification of early security aspects may ensure that appropriate decisions are made at early stage of the software development. However, the techniques to The handling of security-critical aspects at an architectural level still is in

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Reusability, loose coupling, discoverability, and autonomy, are four other design principles of SOA. Reusability enhances composability by ensuring that the design is amendable for future utilization. Unfortunately, if users are ignorant of services then they will not be reused. Therefore, the service registry should be publicized and well design that can help clients identify and use the service that fits their needs. Furthermore, reusability is what allows a service to be composed by many others.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As part of the Every Child Matters (ECM) agenda, Coleham School takes a whole school approach in implementing the 5 National Outcomes of this legislation. Children are protected and kept safe in a number of ways due to policies and attitudes implemented at Coleham. As detailed in the child protection policy for Coleham School, the following legislation, policies and issues are taken into consideration. “The policy reflects current legislation, accepted best practice and complies with the government guidance: Working Together to Safeguard Children March 2015 and Keeping Children Safe in Education July 2015…

    • 248 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Principles of construction are passed down and improved upon as construction technologies advance. For example, mud and straw were considered suitable materials for building shelter, but now they are not. Frederick P. Brooks Jr lays out timeless principles of software engineering in The Mythical Man-Month. Brooks writes about common problems faced by software engineers and how the principles are applied. While elaborating on common problems encountered Brooks goes into specific details about systems that are antiquated due to advances in technology.…

    • 1561 Words
    • 7 Pages
    Superior Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Great Essays

    Summary: Incident Response

    • 4082 Words
    • 17 Pages

    Another threat is the change propagation problem. The protection will entail enforcing…

    • 4082 Words
    • 17 Pages
    Great Essays
  • Improved Essays

    The utilization about middleware on create generally dispersed Healthcare Information System (HIS) need ended up unavoidable. However, those certainty that a lot of people different platforms, Significantly at times heterogeneous should every other, would snared under those same system makes the coordination of Different middleware parts that's only the tip of the iceberg challenging over a portion may trust. This paper examines the HISA standard What's more proposes extensions of the model that, on turn, Might be consistent with different existing disseminated platforms also their middleware segments. Executive Summary:- On social events give a progressed help to those specific needs of the single individual focuses What's more units (which…

    • 667 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Data-centric and process-centric integration are both parts of the integrated structure that Carrier has defined. He defined in 1999 that data-centric is the automation and integration of data, and those data can be exchanged between the information system. Process-centric, on the other hand, is more of involving data and applications together at all levels. Linthicum, Morgenthal and La Forge believes that process-centric integration is the highest level of integration for the business. They are two different integration and organizations can choose what kind of integration structure to use based on what the goal of the organization is since there are pros and cons to both of the integration.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    One of the most prolific disadvantages is that programs using this paradigm are slower mostly due to the greater size of the code. However in recent times the improvements in computers speed and proformance have made restrictions about size and speed inconsequential. HOW IS OBJECT ORIENTATION USED IN THE…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Importance Of MIS

    • 969 Words
    • 4 Pages

    The five-component model can be used to do a business process automatically. This can be done when people do a particular task by following a procedure, and move it so that the computer hardware runs following the rules from the software. It can also be used to evaluate the scope of new systems by using a set of standards that has to be met, or can also be by determining its strengths, weaknesses, opportunities, threats. Every information system involves a person, and thus it is the most important component; however, the usefulness of the information gathered is limited by the quality of a person’s thinking – it depends on how the information will be…

    • 969 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Agile Manifesto

    • 1339 Words
    • 6 Pages

    Businesses environment now has completely change base in a global, rapidly changing environment. They have to respond to new opportunities and markets, transformational of global economies and competing products and services world marketplaces. Software is become the engine of business operations so need of high quality which are developed quickly to take advantage of new opportunities and competition. Faster development and delivery become part and parcel in software. Agile methodologies have changed the field of Software Development since the introduction of the Agile Manifesto.…

    • 1339 Words
    • 6 Pages
    Improved Essays