{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:33Z","timestamp":1725496233156},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_20","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"301-316","source":"Crossref","is-referenced-by-count":0,"title":["Control Flow Based Pointcuts for Security Hardening Concerns"],"prefix":"10.1007","author":[{"given":"Marc-Andr\u00e9","family":"Laverdi\u00e8re","sequence":"first","affiliation":[]},{"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Soeanu","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/59287.59293","volume":"11","author":"H. Ait-Kaci","year":"1989","unstructured":"Hassan Ait-Kaci, Robert S. Boyer, Patrick Lincoln, and Roger Nasr. Efficient implementation of lattice operations. Programming Languages and Systems, 11(1):115\u2013146, 1989.","journal-title":"Programming Languages and Systems"},{"key":"20_CR2","unstructured":"Matt Bishop. How Attackers Break Programs, and How to Write More Secure Programs, http:\/\/nob.cs.ucdavis.edu\/~bishop\/secprog\/sans2002\/index.html (accessed 2007\/04\/19)."},{"key":"20_CR3","unstructured":"Ron Bodkin. Enterprise security aspects, 2004. http:\/\/citeseer.ist.psu.edu\/ 702193.html (accessed 2007\/04\/19)."},{"key":"20_CR4","unstructured":"J. Bon\u00e9r. Semantics for a synchronized block join point, 2005. http:\/\/jonasboner.com\/2005\/07\/18\/ semantics-for-a-synchronized-block-joint-point\/ (accessed 2007\/04\/19)."},{"key":"20_CR5","unstructured":"B. De Win. Engineering Application Level Security through Aspect Oriented Software Development. PhD thesis, Katholieke Universiteit Leuven, 2004."},{"key":"20_CR6","unstructured":"Ernesto Gomez. Cs624-notes on control flow graph. http:\/\/www.csci.csusb. edu\/egomez\/cs624\/cfg.pdf."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"B. harbulot and J.R. Gurd. A join point for loops in Aspect J. In Proceedings of the 4th workshop on Foundations of Aspect-Oriented Languages (FOAL 2005), March, 2005.","DOI":"10.1145\/1119655.1119666"},{"key":"20_CR8","volume-title":"Writing Secure Code","author":"M. Howard","year":"2002","unstructured":"Michael Howard and David E. Leblanc. Writing Secure Code. Microsoft Press, Redmond, WA, USA, 2002."},{"key":"20_CR9","unstructured":"M. Huang, C. Wang, and L. Zhang. Toward a reusable and generic security aspect library. In AOSD:AOSDSEC 04: AOSD Technology for Application level Security, March, 2004."},{"key":"20_CR10","unstructured":"G. Kiczales. The fun has just begun, keynote talk at AOSD 2003, 2003. http:\/\/www.cs.ubc.ca\/~gregor\/papers\/kiczales-aosd-2003.ppt (accessed 2007\/04\/19)."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"H. Masuhara and K. Kawauchi. Dataflow pointcut in aspect-oriented programming. In Proceedings of The First Asian Symposium on Programming Languages and Systems (APLAS\u201903), pages 105\u2013121, 2003.","DOI":"10.1007\/978-3-540-40018-9_8"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"A. Mourad, M-A. Laverdi\u00e8re, and M. Debbabi. Security hardening of open source software. In Proceedings of the 2006 International Conference on Privacy, Security and Trust (PST 2006). ACM, 2006.","DOI":"10.1145\/1501434.1501486"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"A. Mourad, M-A. Laverdi\u00e8re, and M. Debbabi. Towards an aspect oriented approach for the security hardening of code. In To appear in the Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems. IEEE Press, 2007.","DOI":"10.1109\/AINAW.2007.355"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Andrew C. Myers. JFlow: Practical mostly-static information flow control. In Symposium on Principles of Programming Languages, pages 228\u2013241, 1999.","DOI":"10.1145\/292540.292561"},{"key":"20_CR15","unstructured":"R. Seacord. Secure Coding in C and C++. SEI Series. Addison-Wesley, 2005."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Viren Shah. An aspect-oriented security assurance solution. Technical Report AFRL-IF-RS-TR-2003-254, Cigital Labs, 2003.","DOI":"10.21236\/ADA419305"},{"key":"20_CR17","unstructured":"Pawel Slowikowski and Krzysztof Zielinski. Comparison study of aspect-oriented and container managed security. In Proceedings of the ECCOP workshop on Analysis of Aspect-Oriented Software, 2003."},{"key":"20_CR18","unstructured":"D. Wheeler. Secure Programming for Linux and Unix HOWTO \u2014Creating Secure Software v3.010. 2003. http:\/\/www.dwheeler.com\/secure-programs\/ (accessed 2007\/04\/19)."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:42Z","timestamp":1619669562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_20","relation":{},"subject":[]}}