Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Marc-André Laverdière"'
Publikováno v:
Information and Software Technology. 139:106630
Abstract: Web applications often use Role-Based Access Control (RBAC) to restrict operations and protect security sensitive information and resources. Context: Web applications’ RBAC security may be affected by source code changes between releases.
Autor:
Marc-André Laverdière, Ettore Merlo
Publikováno v:
SANER
Role-Based Access Control (RBAC) is often used in web applications to restrict operations and protect security sensitive information and resources. Web applications regularly undergo maintenance and evolution and their security may be affected by sou
Autor:
Ettore Merlo, Marc-André Laverdière
Publikováno v:
PST
Role-Based Access Control (RBAC) is commonly used in web applications to protect information and restrict operations. Their security may be affected by source code changes between releases in unexpected ways. To prevent regression and vulnerabilities
Autor:
Marc-André Laverdière, Ettore Merlo
Publikováno v:
SANER
Role-Based Access Control (RBAC) is commonly used in web applications to protect information and restrict operations. Code changes may affect the security of the application and need to be validated, in order to avoid security vulnerabilities, which
Publikováno v:
Computers & Security. 28:341-358
In this paper, we present new pointcuts and primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. The two proposed pointcuts allow to identify particular join points in a program's co
Publikováno v:
Techniques et sciences informatiques. 28:611-644
In this pauper, we present two new pointcuts and two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. The two proposed pointcuts allow to identify particular join points in a
Publikováno v:
Information Security Journal: A Global Perspective. 17:56-74
In this paper, we present an aspect-oriented approach and propose a high-level language called SHL (Security Hardening Language) for the systematic security hardening of software. The primary contribution of this proposition is providing the software
Publikováno v:
Computers & Security. 27:101-114
In this paper, we present an aspect-oriented approach for the systematic security hardening of source code. It aims at allowing developers to perform software security hardening by providing an abstraction over the actions required to improve the sec
Publikováno v:
SANER
We propose an extension over the traditional call graph to incorporate edges representing control flow between web services, named the Cross-Application Call Graph (CACG). We introduce a construction algorithm for applications built on the Jax-WS sta
Publikováno v:
SOAP@PLDI
One of the first activities of the Soot program analysis framework is to load the classes for analysis. With the current class loader, more classes are loaded than necessary. The overhead in memory of these classes can make whole-program analysis of