메뉴 건너뛰기




Volumn 28, Issue 6, 2009, Pages 341-358

New aspect-oriented constructs for security hardening concerns

Author keywords

Aspect oriented programming; Control flow graph; Dominators; Security hardening; Security software engineering; Software security

Indexed keywords

ASPECT-ORIENTED PROGRAMMING; CONTROL-FLOW GRAPH; DOMINATORS; SECURITY HARDENING; SECURITY/SOFTWARE ENGINEERING; SOFTWARE SECURITY;

EID: 67649823405     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.02.003     Document Type: Article
Times cited : (3)

References (41)
  • 6
    • 67649808356 scopus 로고    scopus 로고
    • Available at: [accessed 11.11.08]
    • Bonér J. Semantics for a synchronized block join point. Available at: (2005). http://www.jonasboner.com/2005/07/18/semantics-for-a-synchronized-block-join-point/ [accessed 11.11.08]
    • (2005) Semantics for a synchronized block join point
    • Bonér, J.1
  • 13
    • 84892648656 scopus 로고    scopus 로고
    • Available at: [accessed 11.11.08]
    • Dijkstra E. Dijkstra's algorithm. Available at:. http://en.wikipedia.org/wiki/Dijkstra_algorithm [accessed 11.11.08]
    • Dijkstra's algorithm
    • Dijkstra, E.1
  • 14
    • 84901810139 scopus 로고    scopus 로고
    • Available at: [accessed 11.11.08]
    • Gomez E. CS624-notes on control flow graph. Available at: (2003). http://www.csci.csusb.edu/egomez/cs624/cfg.pdf [accessed 11.11.08]
    • (2003) CS624-notes on control flow graph
    • Gomez, E.1
  • 30
    • 49849090084 scopus 로고    scopus 로고
    • An aspect oriented approach for the systematic security hardening of code
    • Mourad A., Laverdière M.A., and Debbabi M. An aspect oriented approach for the systematic security hardening of code. Computers & Security 27 3-4 (2008) 101-114
    • (2008) Computers & Security , vol.27 , Issue.3-4 , pp. 101-114
    • Mourad, A.1    Laverdière, M.A.2    Debbabi, M.3
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.