Reference: | 【1】ACM, Proceedings of the 1st International Conference on Aspect-Oriented Software Development, 2001, ACM Press. 【2】ACM, Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2002, ACM Press. 【3】ACM, Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2003, ACM Press. 【4】ACM, Proceedings of the 4th International Conference on Aspect-Oriented Software Development, 2004, ACM Press. 【5】ACM, Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2005, ACM Press. 【6】AOSD Tools Practitioners: http://www.aosd.net/technology/practitioners.php 【7】Apache Struts Web Application Framework: http://struts.apache.org/ 【8】AspectJ website: http://www.eclipse.org/aspectj/ 【9】AspectWerkz website: http://aspectwerkz.codehaus.org/index.html 【10】R. Anderson, Security Engineering: A Guide to Build Dependable Distributed Systems, John Wiley & Sons, 2001. 【11】K. Beznosov, Y. Deng, Engineering Access Control in Distributed Applications, PhD thesis, Florida International University, Miami, FL, 2000. 【12】A. Clement, A. Colyer and M. Kersten, Aspect-Oriented Programming with AJDT, Workshop on Analysis of Aspect-Oriented Software, ECOOP 2003. 【13】M. Curphey, et al., A Guide to Building Secure Web Applications, The Open Web Application Security Project, Version 1.1, 2002. http://www.cgisecurity.com/owasp/html/ 【14】B. De Win and B. De Decker, Building Frameworks in AspectJ, ECOOP 2001, Workshop on Advanced Separation of Concerns, pp.1-6. 【15】B. De Win, W. Joosen and F. Piessens, AOSD & Security:a practical assessment, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03), 2003, pp. 1-6 【16】B. De Win, F. Piessens, W. Joosen and T. Verhanneman, On the importance of the separation-of-concerns principle in secure software engineering, Workshop on the Application of Engineering Principles to System Security Design, 2002. 【17】B. De Win, B. Vanhaute and B. De Decker, How Aspect oriented programming can help to build secure software, Informatica vol.26(2), 2002, pp. 141-149. 【18】B. De Win, B. Vanhaute, B. and De Decker, Security Through Aspect-Oriented Programming, Advances in Network and Distributed Systems Security, Kluwer Academic, pp. 125-138, 2001. 【19】M. Fayad and D. Schmidt, Object-Oriented Application Frameworks, Communications of the ACM. Vol. 40. No. 10, October 1997, pp. 32-38. 【20】E. Gamma, R. Helm, R. Johnson, J. Vlissides: Design Patterns. A.W. L., 1995. ISBN 0-201-63361-2. 【21】L. Giuri, and P. Iglio, Role Templates for Content-Based Access Control, Proceedings, 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA (October 28–29, 1997), pp. 153-59. 【22】R. Goodwin, S. F. Goh and F. Y. Wu, Instance-level access control for business-to-business electronic commerce, IBM System Journal, vol. 41, no. 2, 2002. 【23】S. Hanenberg and A. Schmidmeier, Idioms for Building Software Frameworks in AspectJ, 2nd AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), Boston, MA, March 17, 2003 【24】S. Hanenberg and R. Unland, Using and Reusing Aspects in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA, Oct. 2001 【25】W. Hürsch and C. Videira Lopes, Separation of Concerns, Technical Report, no. NU-CCS-95-03, 1995. 【26】JBoss AOP website: http://www.jboss.org/products/aop, Document download site: http://docs.jboss.org/aop/Aspectframework/ 【27】G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm and W. Griswold, Getting Started with AspectJ, Communications of the ACM, vol. 44, no. 10, pp 59-65, October 2001. 【28】G. Kiczales, J. Lamping, A. Menhdhekar , C. Maeda , C. Lopes, J.-M. Loingtier and J. Irwin, , Aspect-oriented programming, in ECOOP `97 Object-Oriented Programming 11th European Conference," Finland (M. Aksit and S. Matsuoka, eds.), vol. 1241, pp. 220-242, New York, NY: Springer-Verlag, 1997. 【29】C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible Team-based Access Control Using Contexts, Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, May 2001. 【30】S. K. Tzelepi1, D. K. Koukopoulos, and G. Pangalos, A flexible Content and Contextbased Access Control Model for Multimedia Medical Image Database Systems. ACM SIGMM Electronic Proceedings, 2001. 【31】C. Lai, L. Gong, L. Koved, A. Nadalin and R. Schemers, User Authentication And Authorization In The Java Platform, Proceedings of Annual Computer Security Applications Conference, Phoenix, Arizona, USA, 1999, pp. 285-290. http://developer.java.sun.com/developer/technicalArticles/Security/jaasv2/ 【32】I. Nagy, L. Bergmans, M. Aksit, Declarative Aspect Composition, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT04), 2004 【33】Open Web Application Security Project: The Top Ten Most Critical Web Application Security Vulnerabilities. http://www.owasp.org/documentation/topten 【34】H. Ossher and P. Tarr, Using multidimensional separation of concerns to (re)shape evolving software, Communications of the ACM, vol. 44, no. 10, pp 43-50, October 2001. 【35】PROSE website: http://prose.ethz.ch/Wiki.jsp?page=Prose 【36】R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-Based Access Control Models, IEEE Computer, 29(2):38–47, 1996. 【37】D. S. Goldberg, R. B. Findler, M. Flatt, Super and Inner — Together at Last!, OOPSLA 2004, October 2004 【38】T. Verhanneman, L. Jaco, B. De Win, F. Piessens and W. Joosen, Adaptable Access Control Policies for Medical Information Systems, Proc. of Distributed Applications and Interoperable Systems, 2003, Paris, France, LNCS 2893, pp.133-140 【39】E. Wohlstadter, A. Keen, S. Jackson and P. Devanbu, Accommodating Evolution in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA 2001, October 2001 【40】林經緯, 陳恭, 運用剖面導向技術研製網路應用程式之可設定式細緻化存取控管, 第十五屆資訊安全會議(ISC2005),June 2005 |