Aspects and Class-based Security
نویسندگان
چکیده
Various aspect-oriented languages, e.g., AspectJ, AspectWerkz, and JAsCo, have been proposed as extensions to one particular object-oriented base language, namely Java. But these extensions do not fully take the interactions with the Java 2 security model into account. In particular, the implementation technique of advice weaving gives rise to two security issues: the erroneous assignment of aspects to protection domains and the violation of namespace separation. Therefore, a comprehensive discussion of the design choices available with respect to interactions with the dynamic class loading facilities of the Java VM is provided.
منابع مشابه
Studing the relationship between intrinsic motivation and extrinsic motivation on employee knowledge transfer (case study of Social Security organization in Kerman)
Knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. The aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in Kerman. The method research is descriptive and...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملHousehold Food Security: Case of Summer Crop Growers in Shoushtar Township, Iran
associated with this condition among summer crop growers in Shoushtar Township, Khouzestan Province, Iran. This cross-sectional survey study was conducted from September 2015 to February 2017. The population consisted of summer crop farmers in the Shoushtar Township (N=850). The sample size was determined based on Morgan table (n=150). For analyzing food security level, the 18-item USDA househo...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملThe Conceptual Framework of Individual and Social Security Provision in Residential Complexes Based on Iranian-Islamic Foundations
Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...
متن کاملReliability and Supply Security based Method for Simultaneous Placement of Sectionalizer Switch and DER Units
This paper presents a new and useful methodology for simultaneous allocation of sectionalizer switches and distributed energy resources (DERs) considering both reliability and supply security aspects. The proposed algorithm defines the proper locations of sectionalizer switching devices in radial distribution networks considering the effect of DER units in the presented cost function and other ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008