{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:39Z","timestamp":1750307019628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184519","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"24-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Improving security design patterns with aspect-oriented strategies"],"prefix":"10.1145","author":[{"given":"Crystal","family":"Edge","sequence":"first","affiliation":[{"name":"Coastal Carolina University, Conway, SC"}]},{"given":"Francisco","family":"Mitropoulos","sequence":"additional","affiliation":[{"name":"Nova Southeastern University, FL"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"volume-title":"Proc. 3rd International Workshop on Aspect-Oriented Modeling.","author":"Basch M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Blakley B. and Heath C. 2004. Security Design Patterns. The Open Group Security Forum.  Blakley B. and Heath C. 2004. Security Design Patterns . The Open Group Security Forum."},{"volume-title":"AOSDSEC '04","year":"2004","author":"Bodkin R.","key":"e_1_3_2_1_3_1"},{"volume-title":"Workshop on Software Engineering Properties of Languages for Aspect Technologies (SPLAT03)","author":"De Win B.","key":"e_1_3_2_1_4_1"},{"volume-title":"Quantitative Analysis of Modularity Tradeoffs with AspectJ Web-Tier Security Patterns. Workshop on Empirical Evaluation of Software Composition Techniques (ESCOT).","year":"2012","author":"Edge C.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Elrad T. Aksit M. Clarke S. and Filman R. 2004. Developing secure applications through aspect-oriented programming. Chapter in Aspect-oriented Software Development (2005) by Filman Elrad Clarke Aksit. Addison-Wesley Professional.  Elrad T. Aksit M. Clarke S. and Filman R. 2004. Developing secure applications through aspect-oriented programming. Chapter in Aspect-oriented Software Development (2005) by Filman Elrad Clarke Aksit. Addison-Wesley Professional ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052899"},{"volume-title":"IEEE International Conference on Engineering of Complex Computer Systems.","author":"George G.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261287"},{"volume-title":"Workshop on Reuse in Object-Oriented Systems Design (OOIS '02)","author":"Hachani O.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_79"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582436"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261239"},{"volume-title":"AOSDSEC '04","author":"Huang M.","key":"e_1_3_2_1_14_1"},{"volume-title":"Tech. Report DARPA Contract # F30602-01-C-0164.","year":"2002","author":"Kienzle D. M.","key":"e_1_3_2_1_15_1"},{"volume-title":"First International Conference on Aspect-Oriented Software Development (AOSD). Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS).","author":"Kim H.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.12.807"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSE.2005.4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052908"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.688"},{"volume-title":"Security Patterns: Integrating Security and Systems Engineering","year":"2006","author":"Schumacher M.","key":"e_1_3_2_1_21_1"},{"volume-title":"Analysis of Aspect-Oriented Software Workshop. ECOOP","year":"2003","author":"Slowikowski P.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Steel C. Nagappan R. and Lai R. 2006. Core Security Patterns: Best Practices and Strategies for J2EE#8482; Web Services and Identity Management. Prentice-Hall.  Steel C. Nagappan R. and Lai R. 2006. Core Security Patterns: Best Practices and Strategies for J2EE#8482; Web Services and Identity Management . Prentice-Hall."},{"key":"e_1_3_2_1_24_1","unstructured":"Yoder J. and Barcalow J. 1998. Architectural patterns for enabling application security. PLoP'97.  Yoder J. and Barcalow J. 1998. Architectural patterns for enabling application security. PLoP'97 ."},{"key":"e_1_3_2_1_25_1","unstructured":"Yskout K. Heyman T. Scandariato R. and Joosen W. 2007. A system of security patterns. Technical Report CW 469 from DistriNet Research Group Katholieke Universiteit Leuven  Yskout K. Heyman T. Scandariato R. and Joosen W. 2007. A system of security patterns. Technical Report CW 469 from DistriNet Research Group Katholieke Universiteit Leuven"}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":25,"alternative-id":["10.1145\/2184512.2184519","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184519","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}