메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1076-1082

Security policy enforcement in the OSGi framework using aspect-oriented programming

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMOTIVE INDUSTRY; BASIC (PROGRAMMING LANGUAGE); C (PROGRAMMING LANGUAGE); COMPUTER APPLICATIONS; COMPUTER OPERATING SYSTEMS; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; COMPUTERS; DECENTRALIZED CONTROL; GATEWAYS (COMPUTER NETWORKS); HISTORY; JAVA PROGRAMMING LANGUAGE; LINGUISTICS; PUBLIC POLICY; SECURITY OF DATA; SECURITY SYSTEMS; STANDARDS; VEHICLES; WORD PROCESSING;

EID: 51949084798     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2008.149     Document Type: Conference Paper
Times cited : (18)

References (26)
  • 1
    • 51949083175 scopus 로고    scopus 로고
    • The AspectJ Project
    • The AspectJ Project. http://www.eclipse.org/aspectj/.
  • 3
    • 84883394662 scopus 로고    scopus 로고
    • OSGi
    • Knopflerfish - Open source OSGi.http://www.knopflerfish.org/.
    • Open source
  • 6
    • 51949109596 scopus 로고    scopus 로고
    • The Global System for Telematics (GST) project
    • The Global System for Telematics (GST) project. http://www.gstforum.org.
  • 7
    • 51949114584 scopus 로고    scopus 로고
    • Adding trace matching to AspectJ
    • Technical report, The abc Group
    • C. Allan et al. Adding trace matching to AspectJ. Technical report, The abc Group, 2005.
    • (2005)
    • Allan, C.1
  • 8
    • 51949098753 scopus 로고    scopus 로고
    • About the OSGi Service Platform, Paper.pdf, June, 2007
    • About the OSGi Service Platform, Technical Whitepaper. http://www.osgi.org/wiki/uploads/Links/OSGiTechnicalWhitePaper.pdf, June, 2007.
    • Technical Whitepaper
  • 9
    • 51949084592 scopus 로고    scopus 로고
    • J. P. Anderson. Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA, 1972.
    • J. P. Anderson. Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA, 1972.
  • 12
    • 51949101035 scopus 로고    scopus 로고
    • Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research
    • Technical report, Iowa State University
    • J. Dehlinger and N. V. Subramanian. Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research. Technical report, Iowa State University, 2006.
    • (2006)
    • Dehlinger, J.1    Subramanian, N.V.2
  • 13
    • 4544292230 scopus 로고    scopus 로고
    • Composition, reuse and interaction analysis of stateful aspects
    • USA, ACM
    • R. Douence, P. Fradet, and M. Südholt. Composition, reuse and interaction analysis of stateful aspects. In Proceedings of AOSD '04, pages 141-150, USA, 2004. ACM.
    • (2004) Proceedings of AOSD '04 , pp. 141-150
    • Douence, R.1    Fradet, P.2    Südholt, M.3
  • 14
    • 0032218233 scopus 로고    scopus 로고
    • History-based Access Control for Mobile Code
    • New York, USA, ACM
    • G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of CCS '98, pages 38-48, New York, USA, 1998. ACM.
    • (1998) Proceedings of CCS '98 , pp. 38-48
    • Edjlali, G.1    Acharya, A.2    Chaudhary, V.3
  • 16
    • 0012889295 scopus 로고    scopus 로고
    • A Language-based Approach to Security
    • Informatics 10 Years Back, 10 Years Ahead
    • F.B.Schneider, G.Morrisett, and R.Harper. A Language-based Approach to Security. In Informatics 10 Years Back, 10 Years Ahead, LNCS 2000, pages 86-101, 2000.
    • (2000) LNCS , vol.2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, G.2    Harper, R.3
  • 17
    • 35248881593 scopus 로고    scopus 로고
    • Advanced OSGi Security Layer
    • USA, IEEE Computer Society
    • C.-C. Huang, P.-C. Wang, and T.-W. Hou. Advanced OSGi Security Layer. In Proceedings of AINAW '07, pages 518-523, USA, 2007. IEEE Computer Society.
    • (2007) Proceedings of AINAW '07 , pp. 518-523
    • Huang, C.-C.1    Wang, P.-C.2    Hou, T.-W.3
  • 18
    • 51949106653 scopus 로고    scopus 로고
    • Temporal Aspects as Security Automata
    • P. Hui and J. Riely. Temporal Aspects as Security Automata. In Proceedings of FOAL' 06), pages 19-28, 2006.
    • (2006) Proceedings of FOAL' 06) , pp. 19-28
    • Hui, P.1    Riely, J.2
  • 22
    • 51949106069 scopus 로고    scopus 로고
    • Enforcement via Program Monitoring. PhD thesis, Princeton University
    • J. A. Ligatti. Policy Enforcement via Program Monitoring. PhD thesis, Princeton University, 2006.
    • (2006) Policy
    • Ligatti, J.A.1
  • 23
    • 33746696082 scopus 로고    scopus 로고
    • Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform
    • Washington, DC, USA, IEEE Computer Society
    • H.-Y. Lim, Y.-G. Kim, C.-J. Moon, and D.-K. Baik. Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. In Proceedings of ICIS '05, pages 502-507, Washington, DC, USA, 2005. IEEE Computer Society.
    • (2005) Proceedings of ICIS '05 , pp. 502-507
    • Lim, H.-Y.1    Kim, Y.-G.2    Moon, C.-J.3    Baik, D.-K.4
  • 24
    • 47749097920 scopus 로고    scopus 로고
    • Supporting the Secure Deployment of OSGi Bundles
    • IEEE Computer Society, June
    • P. Parrend and S. Frenot. Supporting the Secure Deployment of OSGi Bundles. In Proceedings of WoWMoM 2007. IEEE Computer Society, June 2007.
    • (2007) Proceedings of WoWMoM 2007
    • Parrend, P.1    Frenot, S.2
  • 25
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur, 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 26
    • 51949092674 scopus 로고    scopus 로고
    • Language-Based Security for Malicious Mobile Code
    • Technical report, Cornell Univ Ithaca NY
    • F. B. Schneider, D. Kozen, G. Morrisett, and A. Myers. Language-Based Security for Malicious Mobile Code. Technical report, Cornell Univ Ithaca NY, 2003.
    • (2003)
    • Schneider, F.B.1    Kozen, D.2    Morrisett, G.3    Myers, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.