{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T05:25:15Z","timestamp":1649136315283},"reference-count":41,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.cose.2009.02.003","type":"journal-article","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:46Z","timestamp":1238059606000},"page":"341-358","source":"Crossref","is-referenced-by-count":3,"title":["New aspect-oriented constructs for security hardening concerns"],"prefix":"10.1016","volume":"28","author":[{"given":"Azzam","family":"Mourad","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Soeanu","sequence":"additional","affiliation":[]},{"given":"Marc-Andr\u00e9","family":"Laverdi\u00e8re","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2009.02.003_bib32","series-title":"Proceedings of the 18th IEEE international conference on automated software engineering (ASE03)","article-title":"On the automatic evolution of an OS kernel using temporal logic and AOP","author":"Aberg","year":"2003"},{"issue":"1","key":"10.1016\/j.cose.2009.02.003_bib39","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/59287.59293","article-title":"Efficient implementation of lattice operations","volume":"11","author":"A\u00eft-Kaci","year":"1989","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/j.cose.2009.02.003_bib7","author":"Bishop"},{"key":"10.1016\/j.cose.2009.02.003_bib11","unstructured":"Bodkin R. Enterprise security aspects. In: Proceedings of the workshop on AOSD technology for application-level security (AOSD04: AOSDSEC); 2004."},{"key":"10.1016\/j.cose.2009.02.003_bib30","unstructured":"B\u00f6llert K. On weaving aspects. In: Proceeding of the international workshop on aspect-oriented programming at ECOOP99; 1999."},{"key":"10.1016\/j.cose.2009.02.003_bib20","author":"Bon\u00e9r"},{"issue":"4","key":"10.1016\/j.cose.2009.02.003_bib35","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.54302","article-title":"Constructing the procedure call multigraph","volume":"16","author":"Callahan","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.cose.2009.02.003_bib19","series-title":"AOSD07: proceedings of the 6th international conference on aspect-oriented software development","article-title":"Tribe: a simple virtual class calculus","author":"Clarke","year":"2007"},{"key":"10.1016\/j.cose.2009.02.003_bib27","series-title":"Proceedings of foundations of software engineering","article-title":"Using AspectC to improve the modularity of path-specific customization in operating system code","author":"Coady","year":"2001"},{"key":"10.1016\/j.cose.2009.02.003_bib37","unstructured":"Cooper K, Harvey T, Kennedy K. A simple, fast dominance algorithm. Software Practice and Experience 2001;4:1\u201310."},{"key":"10.1016\/j.cose.2009.02.003_bib33","series-title":"Proceedings of the 10th international workshop on aspect-oriented modeling","article-title":"Stateful aspects: the case for\u00a0aspect-oriented modeling","author":"Cottenier","year":"2007"},{"key":"10.1016\/j.cose.2009.02.003_bib12","unstructured":"DeWin B. Engineering application level security through aspect oriented software development, Ph.D. thesis, Katholieke Universiteit Leuven; 2004."},{"key":"10.1016\/j.cose.2009.02.003_bib41","author":"Dijkstra"},{"key":"10.1016\/j.cose.2009.02.003_bib40","author":"Gomez"},{"issue":"6","key":"10.1016\/j.cose.2009.02.003_bib36","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1145\/506315.506316","article-title":"A framework for call graph construction algorithms","volume":"23","author":"Grove","year":"2001","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/j.cose.2009.02.003_bib31","series-title":"Proceedings of the 2006 international conference on privacy, security and trust (PST 2006)","article-title":"Security crosscutting concerns and AspectJ","author":"Hadidi","year":"2006"},{"key":"10.1016\/j.cose.2009.02.003_bib21","doi-asserted-by":"crossref","unstructured":"Harbulot JR, Gurd A. Join point for loops in AspectJ. In: Proceedings of the 4th workshop on foundations of aspect-oriented languages (FOAL 2005). March; 2005.","DOI":"10.1145\/1119655.1119666"},{"key":"10.1016\/j.cose.2009.02.003_bib38","series-title":"The Machine-SUIF control-flow analysis library","author":"Holloway","year":"1998"},{"key":"10.1016\/j.cose.2009.02.003_bib4","series-title":"Writing secure code","author":"Howard","year":"2002"},{"key":"10.1016\/j.cose.2009.02.003_bib5","series-title":"The security development lifecycle","author":"Howard","year":"2006"},{"key":"10.1016\/j.cose.2009.02.003_bib13","unstructured":"Huang M, Wang C, Zhang L. Toward a reusable and generic security aspect library. In: Proceedings of the workshop on AOSD technology for application-level security (AOSD04: AOSDSEC); 2004."},{"key":"10.1016\/j.cose.2009.02.003_bib22","author":"Kiczales"},{"key":"10.1016\/j.cose.2009.02.003_bib26","series-title":"Proceedings of the 15th European conference ECOOP 2001","article-title":"Overview of AspectJ","author":"Kiczales","year":"2001"},{"key":"10.1016\/j.cose.2009.02.003_bib29","series-title":"An AOSD implementation for C#, tech. rep. TCD-CS2002-55","author":"Kim","year":"2002"},{"key":"10.1016\/j.cose.2009.02.003_bib25","unstructured":"Laverdi\u00e8re MA, Mourad A, Soeanu A, Debbabi M. Control flow based pointcuts for security hardening concerns. In: Proceedings of the joint iTrust and PST conferences on privacy, trust management and security. Moncton, New Brunswick, Canada; 2007."},{"key":"10.1016\/j.cose.2009.02.003_bib23","doi-asserted-by":"crossref","unstructured":"Masuhara H, Kawauchi K. Dataflow pointcut in aspect-oriented programming. In: Proceedings of the first Asian symposium on programming languages and systems (APLAS03); 2003.","DOI":"10.1007\/978-3-540-40018-9_8"},{"key":"10.1016\/j.cose.2009.02.003_bib1","series-title":"Proceedings of the 2006 international conference on privacy, security and trust (PST 2006)","article-title":"Security hardening of open source software","author":"Mourad","year":"2006"},{"key":"10.1016\/j.cose.2009.02.003_bib8","series-title":"Proceedings of the 3rd IEEE international symposium on security in networks and distributed systems","article-title":"Towards an aspect oriented approach for the security hardening of code","author":"Mourad","year":"2007"},{"key":"10.1016\/j.cose.2009.02.003_bib9","series-title":"Proceedings of the international conference on security and cryptography","article-title":"A high-level aspect-oriented based language for software security hardening","author":"Mourad","year":"2007"},{"issue":"3\u20134","key":"10.1016\/j.cose.2009.02.003_bib10","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cose.2008.04.003","article-title":"An aspect oriented approach for the systematic security hardening of code","volume":"27","author":"Mourad","year":"2008","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2009.02.003_bib24","series-title":"Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on principles of programming languages (POPL99)","article-title":"Jflow: practical mostly-static information flow control","author":"Myers","year":"1999"},{"key":"10.1016\/j.cose.2009.02.003_bib18","series-title":"AOSD06: proceedings of the 5th international conference on aspect-oriented software development","article-title":"Explicitly distributed AOP using AWED","author":"Navarro","year":"2006"},{"issue":"3","key":"10.1016\/j.cose.2009.02.003_bib34","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TSE.1979.234183","article-title":"Constructing the call graph of a program","volume":"5","author":"Ryder","year":"1979","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.cose.2009.02.003_bib2","series-title":"Security patterns: integrating security and systems engineering","author":"Schumacher","year":"2006"},{"key":"10.1016\/j.cose.2009.02.003_bib3","series-title":"Secure coding in C and C++, SEI series","author":"Seacord","year":"2005"},{"key":"10.1016\/j.cose.2009.02.003_bib14","series-title":"An aspect-oriented security assurance solution, techical report AFRL-IF-RS-TR-2003-254","author":"Shah","year":"2003"},{"key":"10.1016\/j.cose.2009.02.003_bib17","series-title":"Proceedings of the DARPA information survivability conference and exposition (DISCEX 03)","article-title":"Aspect-oriented programming security framework","author":"Shah","year":"2003"},{"key":"10.1016\/j.cose.2009.02.003_bib16","unstructured":"Slowikowski P, Zielinski K. Comparison study of aspect-oriented and container managed security. In: Proceedings of the ECCOP workshop on analysis of aspect-oriented software; 2003."},{"key":"10.1016\/j.cose.2009.02.003_bib28","unstructured":"Spinczyk O, Gal A, Schr\u00f6der-Preikschat W. AspectC++: an aspect-oriented extension to C++. In: Proceedings of the 40th international conference on technology of object-oriented languages and systems; 2002."},{"key":"10.1016\/j.cose.2009.02.003_bib6","author":"Wheeler"},{"key":"10.1016\/j.cose.2009.02.003_bib15","series-title":"30th Annual international computer software and applications conference (COMPSAC'06)","article-title":"An aspect-oriented approach to security requirements analysis","author":"Xu","year":"2006"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740480900011X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740480900011X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T03:04:47Z","timestamp":1558235087000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740480900011X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["S016740480900011X"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.02.003","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}