{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:23Z","timestamp":1750308923853,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,24]],"date-time":"2013-03-24T00:00:00Z","timestamp":1364083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,24]]},"DOI":"10.1145\/2451436.2451456","type":"proceedings-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T14:14:26Z","timestamp":1364220866000},"page":"157-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure and modular access control with aspects"],"prefix":"10.1145","author":[{"given":"Rodolfo","family":"Toledo","sequence":"first","affiliation":[{"name":"University of Chile, Santiago, Chile"}]},{"given":"\u00c9ric","family":"Tanter","sequence":"additional","affiliation":[{"name":"University of Chile, Santiago, Chile"}]}],"member":"320","published-online":{"date-parts":[[2013,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"107","volume-title":"Proceedings of the 10th annual Network and Distributed System Security Symposium","author":"Abadi M.","year":"2003","unstructured":"M. Abadi and C. Fournet . Access control based on execution history . In Proceedings of the 10th annual Network and Distributed System Security Symposium , pages 107 -- 121 , 2003 . M. Abadi and C. Fournet. Access control based on execution history. In Proceedings of the 10th annual Network and Distributed System Security Symposium, pages 107--121, 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"9th ACM International Conference on Aspect-Oriented Software Development (AOSD 2010","author":"Proceedings","year":"2010","unstructured":"Proceedings of the 9th ACM International Conference on Aspect-Oriented Software Development (AOSD 2010 ), Rennes and Saint Malo, France , Mar. 2010 . ACM Press. Proceedings of the 9th ACM International Conference on Aspect-Oriented Software Development (AOSD 2010), Rennes and Saint Malo, France, Mar. 2010. ACM Press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960293"},{"key":"e_1_3_2_1_4_1","volume-title":"Essential .NET: The common language runtime","author":"Box D.","year":"2002","unstructured":"D. Box and C. Sells . Essential .NET: The common language runtime , volume 1 . Addison-Wesley , Nov. 2002 . D. Box and C. Sells. Essential .NET: The common language runtime, volume 1. Addison-Wesley, Nov. 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.528"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.02.009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111071"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739254"},{"key":"e_1_3_2_1_9_1","first-page":"633","volume-title":"Aspect-Oriented Software Development","author":"Win B. De","year":"2004","unstructured":"B. De Win , W. Joosen , and F. Piessens . Developing secure applications through Aspect-Oriented programming . In Aspect-Oriented Software Development , pages 633 -- 650 . Addison-Wesley Professional , Oct. 2004 . B. De Win, W. Joosen, and F. Piessens. Developing secure applications through Aspect-Oriented programming. In Aspect-Oriented Software Development, pages 633--650. Addison-Wesley Professional, Oct. 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.01.003"},{"key":"e_1_3_2_1_11_1","volume-title":"ECMAScript Language Specification. ECMA-262","author":"International ECMA","year":"2009","unstructured":"ECMA International . ECMAScript Language Specification. ECMA-262 . 5 th edition, Apr. 2009 . ECMA International. ECMAScript Language Specification. ECMA-262. 5th edition, Apr. 2009.","edition":"5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884407"},{"key":"e_1_3_2_1_13_1","volume-title":"Semantics Engineering with PLT Redex","author":"Felleisen M.","year":"2009","unstructured":"M. Felleisen , R. B. Findler , and M. Flatt . Semantics Engineering with PLT Redex . MIT Press , 2009 . M. Felleisen, R. B. Findler, and M. Flatt. Semantics Engineering with PLT Redex. MIT Press, 2009."},{"key":"e_1_3_2_1_14_1","first-page":"554","volume-title":"15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn . Role-Based access control . 15th NIST-NCSC National Computer Security Conference , pages 554 -- 563 , 1992 . D. Ferraiolo and R. Kuhn. Role-Based access control. 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/641909.641912"},{"key":"e_1_3_2_1_16_1","volume-title":"The Java Language Specification","author":"Gosling J.","year":"2005","unstructured":"J. Gosling , B. Joy , G. Steele , and G. Bracha . The Java Language Specification , 3 rd edition. Addison-Wesley , 2005 . J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification, 3rd edition. Addison-Wesley, 2005.","edition":"3"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-642-14107-2_7","volume-title":"T. D'Hondt","author":"Guha A.","year":"2010","unstructured":"A. Guha , C. Saftoiu , and S. Krishnamurthi . The essence of JavaScript . In T. D'Hondt , editor, Proceedings of the 24th European Conference on Object-oriented Programming (ECOOP 2010 ), number 6183 in Lecture Notes in Computer Science , pages 126 -- 150 , Maribor, Slovenia, June 2010. Springer-Verlag . A. Guha, C. Saftoiu, and S. Krishnamurthi. The essence of JavaScript. In T. D'Hondt, editor, Proceedings of the 24th European Conference on Object-oriented Programming (ECOOP 2010), number 6183 in Lecture Notes in Computer Science, pages 126--150, Maribor, Slovenia, June 2010. Springer-Verlag."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_19_1","volume-title":"AOSD Technologies for Application-Level Security","author":"Huang M.","year":"2004","unstructured":"M. Huang , C. Wang , and L. Zhang . Toward a reusable and generic security aspect library . In AOSD Technologies for Application-Level Security , 2004 . M. Huang, C. Wang, and L. Zhang. Toward a reusable and generic security aspect library. In AOSD Technologies for Application-Level Security, 2004."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP 2001","author":"Kiczales G.","year":"2072","unstructured":"G. Kiczales , E. Hilsdale , J. Hugunin , M. Kersten , J. Palm , and W. Griswold . An overview of AspectJ. In J. L. Knudsen, editor , Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP 2001 ), number 2072 in Lecture Notes in Computer Science, pages 327--353, Budapest, Hungary , June 2001. Springer-Verlag. G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. Griswold. An overview of AspectJ. In J. L. Knudsen, editor, Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP 2001), number 2072 in Lecture Notes in Computer Science, pages 327--353, Budapest, Hungary, June 2001. Springer-Verlag."},{"key":"e_1_3_2_1_21_1","volume-title":"June","author":"Mourad A.","year":"2008","unstructured":"A. Mourad , M. Laverdi\u00e8re , and M. Debbabi . An aspect-oriented approach for the systematic security hardening of code. Computers & Security, 27(3--4):101--114 , June 2008 . A. Mourad, M. Laverdi\u00e8re, and M. Debbabi. An aspect-oriented approach for the systematic security hardening of code. Computers & Security, 27(3--4):101--114, June 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739244"},{"key":"e_1_3_2_1_23_1","volume-title":"AspectJ for Multilevel Security. Master Thesis","author":"Ramachandran R.","year":"2006","unstructured":"R. Ramachandran . AspectJ for Multilevel Security. Master Thesis , Victoria University of Wellington , 2006 . R. Ramachandran. AspectJ for Multilevel Security. Master Thesis, Victoria University of Wellington, 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646206.683112"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Workshop on Analysis of Aspect Oriented Software","author":"S\u0142owikowski P.","year":"2003","unstructured":"P. S\u0142owikowski and K. Zielinski . Comparison study of aspect-oriented and container managed security . In Proceedings of the Workshop on Analysis of Aspect Oriented Software , Germany , 2003 . P. S\u0142owikowski and K. Zielinski. Comparison study of aspect-oriented and container managed security. In Proceedings of the Workshop on Analysis of Aspect Oriented Software, Germany, 2003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353482.1353503"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640134.1640137"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739236"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.06.011"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739233"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.6"},{"key":"e_1_3_2_1_32_1","unstructured":"R. Toledo and \u00c9. Tanter. Secure and modular access control with aspects--supplementary material. http:\/\/users.dcc.uchile.cl\/ rtoledo\/modac-aosd\/.  R. Toledo and \u00c9. Tanter. Secure and modular access control with aspects--supplementary material. http:\/\/users.dcc.uchile.cl\/ rtoledo\/modac-aosd\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.154"},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"Workshop on Advanced Separation of Concerns (ECOOP)","author":"Vanhaute B.","year":"2001","unstructured":"B. Vanhaute , B. De Decker , and B. De Win . Building frameworks in AspectJ . Workshop on Advanced Separation of Concerns (ECOOP) , pages 1 -- 6 , 2001 . B. Vanhaute, B. De Decker, and B. De Win. Building frameworks in AspectJ. Workshop on Advanced Separation of Concerns (ECOOP), pages 1--6, 2001."},{"issue":"2","key":"e_1_3_2_1_35_1","first-page":"31","article-title":"Applying Aspect-Oriented programming to security","volume":"14","author":"Viega J.","year":"2001","unstructured":"J. Viega , J. Bloch , and P. Chandra . Applying Aspect-Oriented programming to security . Cutter IT Journal , 14 ( 2 ): 31 -- 39 , Feb. 2001 . J. Viega, J. Bloch, and P. Chandra. Applying Aspect-Oriented programming to security. Cutter IT Journal, 14(2):31--39, Feb. 2001.","journal-title":"Cutter IT Journal"}],"event":{"name":"AOSD '13: Aspect-Oriented Software Development","sponsor":["AOSA Aspect-Oriented Software Association","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Fukuoka Japan","acronym":"AOSD '13"},"container-title":["Proceedings of the 12th annual international conference on Aspect-oriented software development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2451436.2451456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2451436.2451456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:41Z","timestamp":1750282601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2451436.2451456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,24]]},"references-count":35,"alternative-id":["10.1145\/2451436.2451456","10.1145\/2451436"],"URL":"https:\/\/doi.org\/10.1145\/2451436.2451456","relation":{},"subject":[],"published":{"date-parts":[[2013,3,24]]},"assertion":[{"value":"2013-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}