{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:11:41Z","timestamp":1654132301802},"reference-count":41,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>This paper discusses Aspect-Oriented Programming (AOP) as an efficient way to handle security concerns in Web services. Without AOP, the necessary security code would be mixed with the business logic that a Web service implements. This renders the maintenance of both code and business logic tedious and prone to errors. AOP allows confining codes of non-functional concerns like security and self-healing into specific modules so that they do not cross-cut with the Web service's business logic. The proposed aspect-oriented approach in this paper is built upon three levels referred to as user, component, and resource, and adopts three types of context, one context per level. The contexts contain various details on the environment of Web services, which permits activating the necessary aspects in response to these details. A set of experiments validating this approach are also reported in this paper.<\/p>","DOI":"10.4018\/ijoci.2014040102","type":"journal-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T13:59:47Z","timestamp":1410357587000},"page":"31-44","source":"Crossref","is-referenced-by-count":0,"title":["SC-WS"],"prefix":"10.4018","volume":"4","author":[{"given":"Ghita Kouadri","family":"Mostefaoui","sequence":"first","affiliation":[{"name":"University Campus Milton Keynes, Buckinghamshire, UK"}]},{"given":"Zakaria","family":"Maamar","sequence":"additional","affiliation":[{"name":"Zayed University, Dubai, United Arab Emirates"}]},{"given":"Nanjangud C.","family":"Narendra","sequence":"additional","affiliation":[{"name":"IBM India Software Lab, Bangalore, India"}]}],"member":"2432","reference":[{"key":"ijoci.2014040102-0"},{"key":"ijoci.2014040102-1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2013.054109"},{"key":"ijoci.2014040102-2","first-page":"1","article-title":"Semantic matching of Web services security policies.","author":"M.Ben Jemaa","year":"2012","journal-title":"Proceedings of 7th International Conference on Risks and Security of Internet and Systems (CRiSIS\u20192012)"},{"key":"ijoci.2014040102-3","doi-asserted-by":"publisher","DOI":"10.1145\/1035134.1035157"},{"key":"ijoci.2014040102-4","first-page":"489","article-title":"Towards secure execution orders for composite web services.","author":"J.Biskup","journal-title":"Proceedings of IEEE International Conference on Web Services (ICWS 2007)"},{"key":"ijoci.2014040102-5"},{"key":"ijoci.2014040102-6","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162063"},{"key":"ijoci.2014040102-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.188"},{"key":"ijoci.2014040102-8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.117"},{"key":"ijoci.2014040102-9","article-title":"Reasoning about semantic conflicts between aspects.","author":"P.Durr","journal-title":"Proceedings of the 2nd European Interactive Workshop on Aspects in Software (EIWAS\u20192005)"},{"key":"ijoci.2014040102-10","unstructured":"EL-Manzalawy. Y. (n.d.). Aspect oriented programming. Retrieved from http:\/\/www.developer.com\/design\/article.php\/3308941"},{"issue":"4","key":"ijoci.2014040102-11","first-page":"430","article-title":"A survey of patterns for web services security and reliability standards.","volume":"2012","author":"E. B.Fernandez","year":"2013","journal-title":"Future Internet"},{"key":"ijoci.2014040102-12","unstructured":"Ginn, H., Kouadri Mostefaoui, G., Levik, K., Grimes, J., Walsh, M., Ashton, A., & Stuart, D. (2013). SynchLink: An IOS app for viewing data interactively from synchrotron MX beamlines. In CCP4 Newsletter on Protein Crystallography, Number 49, Summer 2013 (pp. 20-24)."},{"key":"ijoci.2014040102-13","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2013.22"},{"key":"ijoci.2014040102-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_26"},{"key":"ijoci.2014040102-15","author":"S.Kleinschmager","year":"2012","journal-title":"Aspect-oriented programming evaluated: A study on the impact that aspect-oriented programming can have on software development productivity"},{"key":"ijoci.2014040102-16","unstructured":"Kouadri Mostefaoui, G. (2004). Towards a conceptual and software framework for integrating context-based security in pervasive environments. Ph.D. Thesis No. 1463, University of Fribourg and Paris 6 University."},{"key":"ijoci.2014040102-17","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2006.47"},{"key":"ijoci.2014040102-18","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.98"},{"key":"ijoci.2014040102-19","article-title":"Supporting evolution in software using frame technology and aspect orientation.","author":"N.Loughran","journal-title":"Proceedings of The Workshop on Software Variability Management"},{"key":"ijoci.2014040102-20","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"ijoci.2014040102-21","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2005.47"},{"key":"ijoci.2014040102-22","doi-asserted-by":"publisher","DOI":"10.1145\/1183236.1183238"},{"key":"ijoci.2014040102-23","doi-asserted-by":"crossref","unstructured":"Maamar, Z., Kouadri Mostefaoui, S., & Mahmoud, Q. H. (2005). On personalizing web services using context. International Journal of E-Business Research, Special Issue on E-Services, 1(3).","DOI":"10.4018\/jebr.2005070103"},{"key":"ijoci.2014040102-24","unstructured":"Moorthy, K. R., & Gandhirajan, A. (2005). The foundations of web services security. Retrieved from http:\/\/www.developer.com\/services\/article.php\/3496326"},{"key":"ijoci.2014040102-25","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246125"},{"key":"ijoci.2014040102-26","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2012.051526"},{"key":"ijoci.2014040102-27","article-title":"SA4WSs: A security architecture for web services.","author":"K.Mustofa","journal-title":"Proceedings of International Conference on ICT-EurAsia 2013"},{"key":"ijoci.2014040102-28","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2002.994567"},{"key":"ijoci.2014040102-29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.400"},{"issue":"5","key":"ijoci.2014040102-30","doi-asserted-by":"crossref","DOI":"10.14299\/ijser.2012.05.002","article-title":"Security analysis for web services compositions.","volume":"3","author":"M.Rouached","year":"2012","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ijoci.2014040102-31","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167341"},{"key":"ijoci.2014040102-32","article-title":"Towards context-based tracking of web services security.","author":"S.Sattanathan","journal-title":"Proceedings of The 7th International Conference on Information Integration and Web Based Applications & Services (iiWAS\u20192005)"},{"key":"ijoci.2014040102-33","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Beigl, M., & Gellersen, H. W. (1999). There is more to context than location. Computers & Graphics Journal, 23(6).","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"ijoci.2014040102-34","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2012.050119"},{"key":"ijoci.2014040102-35","unstructured":"Singhal, A. (2008, July 13-16). Web services security: Techniques and challenges. In the Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec\u20192008), London, UK."},{"key":"ijoci.2014040102-36","unstructured":"Spring AOP vs. AspectJ. (2011). Retrieved from http:\/\/k2java.blogspot.co.uk\/2011\/04\/spring-aop-vs-aspectj.html"},{"key":"ijoci.2014040102-37","unstructured":"Web Services Security. Version 1.1. (2006). Retrieved from https:\/\/www.oasis-open.org\/committees\/download.php\/16790\/wss-v1.1-spec-os-SOAPMessageSecurity.pdf"},{"key":"ijoci.2014040102-38","unstructured":"Wikipedia. (n.d.). Multiplexing. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Multiplexing\/"},{"key":"ijoci.2014040102-39","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2010.18"},{"key":"ijoci.2014040102-40","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2012.35"}],"container-title":["International Journal of Organizational and Collective Intelligence"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=114647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:43:49Z","timestamp":1654130629000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijoci.2014040102"}},"subtitle":["A Context-based, Aspect-oriented Approach for Handling Security Concerns in Web Services"],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijoci.2014040102","relation":{},"ISSN":["1947-9344","1947-9352"],"issn-type":[{"value":"1947-9344","type":"print"},{"value":"1947-9352","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}