Evolution of Aspects for Legacy System Security Concerns
نویسندگان
چکیده
This paper shows how aspects can be successfully employed in the support of system evolution. The context is a case study on migrating a legacy client-server application to overcome the security problems associated with ‘message tampering’ attacks. The focus is on authorization issues in which aspects are used to add a security mechanism based on digital signatures. The approach provides for future evolution of the system. In particular, it is shown how factoring of aspectual concerns allows the scope of the security boundary to be varied, illustrating reuse of the aspects. Whilst the aspects are added non-intrusively, it is demonstrated how aspects can modify the control-flow behaviour of a server. We propose a programming idiom that conforms to Design by Contract.
منابع مشابه
Evolving Legacy System Security Concerns Using Aspects
This paper shows how aspects can be successfully employed in the support of system evolution. The context is a case study on migrating a legacy client-server application to overcome the security problems associated with ‘message tampering’ attacks. The focus is on authorization issues in which aspects are used to add a security mechanism based on digital signatures. The approach provides for fu...
متن کاملSecurity Analysis in the Migration to Cloud Environments
Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to m...
متن کاملA Study of Cohesion Metrics for Aspect- Oriented Systems
Aspect-oriented is new programming approach to develop software. There are various existing approaches like modular and objectoriented but these approaches suffer from limitation in properly separating crosscutting concerns. Examples of cross cutting concerns are caching, tracing, logging, security, resource pooling, synchronization, exception handling etc. Code related to these concerns is gen...
متن کاملEvolution of legacy systems : strategic and technological issues, based on a case study
The goal of this experience report is to highlight the strategic and managerial issues that are likely to be involved in any migration or evolution effort of large-scale legacy systems. The report is based on a specific case study of a large organisation in the Belgian health care and social security system. Major drivers for a legacy evolution effort are identified. Emphasis is put on the requ...
متن کاملA Security Approach for Data Migration in Cloud Computing Based on Human Genetics
Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004