Publications-Theses

題名 建構可重用與細緻化的剖面導向存取控管框架
Building a Reusable and Fine-grained Aspect-Oriented Access Control Framework
作者 黃植懋
Huang , Chih-Mao
貢獻者 陳恭
Chen , Kung
黃植懋
Huang , Chih-Mao
關鍵詞 存取控管
剖面導向程式設計
框架
網頁應用程式
Access Control
Aspect-Oriented Programming
Framework
Web Applications
日期 2004
上傳時間 17-Sep-2009 14:08:32 (UTC+8)
摘要 隨著網路應用的發達與普及,應用系統的安全防護非常重要,但是要將安全方防護方面的設計與製作做好,卻不容易。因為與安全相關的程式碼必須嵌入到應用系統的各個模組中去執行,具有橫跨(cross-cutting)的特性。在設計時,若不加以區分,仍然以一般的物件或是函式模組來將其模組化的話,往往造成系統中反覆出現類似的程式碼以及不同需求的程式碼夾雜不清的現象,當系統愈趨複雜時,這些問題就愈顯嚴重,結果導致系統不易維護且錯誤頻仍。
最近興起的剖面導向程式設計(Aspect-Oriented Programming)基於關注分離的原則(Separation of Concerns),針對像安全這類橫跨性的需求,倡議在原有的物件或函式模組外,另以剖面(aspect)作為這些橫跨性需求的模組單位,以大幅改善應用系統的模組性。近兩三年來,這方面的發展迅速,各種支援方面導向的程式語言與相關工具相繼推出,美國全錄公司柏拉圖實驗室發展的AspectJ語言就是一個具代表性的成果。本論文以剖面導向的原則,以AspectJ及JBossAOP為主要工具,針對Web應用程式在認證與存取控管方面的安全需求,設計與製作一套具重用性且可處理資料內容相關、細緻層級的存取控管框架。
Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with restricted access, yet the rule to grant a request is highly dependent on the application state. Hence it is common to see the code for implementing access control scattered over the system and tangled with the functional code, making the system difficult to maintain. This thesis addresses this issue for Web applications by presenting a practical access control framework based on aspect-oriented programming (AOP). Our approach accommodates a wide range of access control requirements of different granularity. AOP supports the modular implementation of access control while still enables the code to get a hold of the application state. Moreover, framework technology offers a balanced view between reuse and customization. As a result, our framework is able to enforce fine-grained access control for Web applications in a highly adaptable manner.
參考文獻 【1】ACM, Proceedings of the 1st International Conference on Aspect-Oriented Software Development, 2001, ACM Press.
【2】ACM, Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2002, ACM Press.
【3】ACM, Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2003, ACM Press.
【4】ACM, Proceedings of the 4th International Conference on Aspect-Oriented Software Development, 2004, ACM Press.
【5】ACM, Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2005, ACM Press.
【6】AOSD Tools Practitioners:
http://www.aosd.net/technology/practitioners.php
【7】Apache Struts Web Application Framework: http://struts.apache.org/
【8】AspectJ website: http://www.eclipse.org/aspectj/
【9】AspectWerkz website: http://aspectwerkz.codehaus.org/index.html
【10】R. Anderson, Security Engineering: A Guide to Build Dependable Distributed Systems, John Wiley & Sons, 2001.
【11】K. Beznosov, Y. Deng, Engineering Access Control in Distributed Applications, PhD thesis, Florida International University, Miami, FL, 2000.
【12】A. Clement, A. Colyer and M. Kersten, Aspect-Oriented Programming with AJDT, Workshop on Analysis of Aspect-Oriented Software, ECOOP 2003.
【13】M. Curphey, et al., A Guide to Building Secure Web Applications, The Open Web Application Security Project, Version 1.1, 2002.
http://www.cgisecurity.com/owasp/html/
【14】B. De Win and B. De Decker, Building Frameworks in AspectJ, ECOOP 2001, Workshop on Advanced Separation of Concerns, pp.1-6.
【15】B. De Win, W. Joosen and F. Piessens, AOSD & Security:a practical assessment, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03), 2003, pp. 1-6
【16】B. De Win, F. Piessens, W. Joosen and T. Verhanneman, On the importance of the separation-of-concerns principle in secure software engineering, Workshop on the Application of Engineering Principles to System Security Design, 2002.
【17】B. De Win, B. Vanhaute and B. De Decker, How Aspect oriented programming can help to build secure software, Informatica vol.26(2), 2002, pp. 141-149.
【18】B. De Win, B. Vanhaute, B. and De Decker, Security Through Aspect-Oriented Programming, Advances in Network and Distributed Systems Security, Kluwer Academic, pp. 125-138, 2001.
【19】M. Fayad and D. Schmidt, Object-Oriented Application Frameworks, Communications of the ACM. Vol. 40. No. 10, October 1997, pp. 32-38.
【20】E. Gamma, R. Helm, R. Johnson, J. Vlissides: Design Patterns. A.W. L., 1995. ISBN 0-201-63361-2.
【21】L. Giuri, and P. Iglio, Role Templates for Content-Based Access Control, Proceedings, 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA (October 28–29, 1997), pp. 153-59.
【22】R. Goodwin, S. F. Goh and F. Y. Wu, Instance-level access control for business-to-business electronic commerce, IBM System Journal, vol. 41, no. 2, 2002.
【23】S. Hanenberg and A. Schmidmeier, Idioms for Building Software Frameworks in AspectJ, 2nd AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), Boston, MA, March 17, 2003
【24】S. Hanenberg and R. Unland, Using and Reusing Aspects in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA, Oct. 2001
【25】W. Hürsch and C. Videira Lopes, Separation of Concerns, Technical Report, no. NU-CCS-95-03, 1995.
【26】JBoss AOP website: http://www.jboss.org/products/aop,
Document download site: http://docs.jboss.org/aop/Aspectframework/
【27】G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm and W. Griswold, Getting Started with AspectJ, Communications of the ACM, vol. 44, no. 10, pp 59-65, October 2001.
【28】G. Kiczales, J. Lamping, A. Menhdhekar , C. Maeda , C. Lopes, J.-M. Loingtier and J. Irwin, , Aspect-oriented programming, in ECOOP `97 Object-Oriented Programming 11th European Conference," Finland (M. Aksit and S. Matsuoka, eds.), vol. 1241, pp. 220-242, New York, NY: Springer-Verlag, 1997.
【29】C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible Team-based Access Control Using Contexts, Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, May 2001.
【30】S. K. Tzelepi1, D. K. Koukopoulos, and G. Pangalos, A flexible Content and Contextbased Access Control Model for Multimedia Medical Image Database Systems. ACM SIGMM Electronic Proceedings, 2001.
【31】C. Lai, L. Gong, L. Koved, A. Nadalin and R. Schemers, User Authentication And Authorization In The Java Platform, Proceedings of Annual Computer Security Applications Conference, Phoenix, Arizona, USA, 1999, pp. 285-290.
http://developer.java.sun.com/developer/technicalArticles/Security/jaasv2/
【32】I. Nagy, L. Bergmans, M. Aksit, Declarative Aspect Composition, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT04), 2004
【33】Open Web Application Security Project: The Top Ten Most Critical Web Application Security Vulnerabilities.
http://www.owasp.org/documentation/topten
【34】H. Ossher and P. Tarr, Using multidimensional separation of concerns to (re)shape evolving software, Communications of the ACM, vol. 44, no. 10, pp 43-50, October 2001.
【35】PROSE website: http://prose.ethz.ch/Wiki.jsp?page=Prose
【36】R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-Based Access Control Models, IEEE Computer, 29(2):38–47, 1996.
【37】D. S. Goldberg, R. B. Findler, M. Flatt, Super and Inner — Together at Last!, OOPSLA 2004, October 2004
【38】T. Verhanneman, L. Jaco, B. De Win, F. Piessens and W. Joosen, Adaptable Access Control Policies for Medical Information Systems, Proc. of Distributed Applications and Interoperable Systems, 2003, Paris, France, LNCS 2893, pp.133-140
【39】E. Wohlstadter, A. Keen, S. Jackson and P. Devanbu, Accommodating Evolution in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA 2001, October 2001
【40】林經緯, 陳恭, 運用剖面導向技術研製網路應用程式之可設定式細緻化存取控管, 第十五屆資訊安全會議(ISC2005),June 2005
描述 碩士
國立政治大學
資訊科學學系
92753024
93
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0927530241
資料類型 thesis
dc.contributor.advisor 陳恭zh_TW
dc.contributor.advisor Chen , Kungen_US
dc.contributor.author (Authors) 黃植懋zh_TW
dc.contributor.author (Authors) Huang , Chih-Maoen_US
dc.creator (作者) 黃植懋zh_TW
dc.creator (作者) Huang , Chih-Maoen_US
dc.date (日期) 2004en_US
dc.date.accessioned 17-Sep-2009 14:08:32 (UTC+8)-
dc.date.available 17-Sep-2009 14:08:32 (UTC+8)-
dc.date.issued (上傳時間) 17-Sep-2009 14:08:32 (UTC+8)-
dc.identifier (Other Identifiers) G0927530241en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/32725-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 92753024zh_TW
dc.description (描述) 93zh_TW
dc.description.abstract (摘要) 隨著網路應用的發達與普及,應用系統的安全防護非常重要,但是要將安全方防護方面的設計與製作做好,卻不容易。因為與安全相關的程式碼必須嵌入到應用系統的各個模組中去執行,具有橫跨(cross-cutting)的特性。在設計時,若不加以區分,仍然以一般的物件或是函式模組來將其模組化的話,往往造成系統中反覆出現類似的程式碼以及不同需求的程式碼夾雜不清的現象,當系統愈趨複雜時,這些問題就愈顯嚴重,結果導致系統不易維護且錯誤頻仍。
最近興起的剖面導向程式設計(Aspect-Oriented Programming)基於關注分離的原則(Separation of Concerns),針對像安全這類橫跨性的需求,倡議在原有的物件或函式模組外,另以剖面(aspect)作為這些橫跨性需求的模組單位,以大幅改善應用系統的模組性。近兩三年來,這方面的發展迅速,各種支援方面導向的程式語言與相關工具相繼推出,美國全錄公司柏拉圖實驗室發展的AspectJ語言就是一個具代表性的成果。本論文以剖面導向的原則,以AspectJ及JBossAOP為主要工具,針對Web應用程式在認證與存取控管方面的安全需求,設計與製作一套具重用性且可處理資料內容相關、細緻層級的存取控管框架。
zh_TW
dc.description.abstract (摘要) Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with restricted access, yet the rule to grant a request is highly dependent on the application state. Hence it is common to see the code for implementing access control scattered over the system and tangled with the functional code, making the system difficult to maintain. This thesis addresses this issue for Web applications by presenting a practical access control framework based on aspect-oriented programming (AOP). Our approach accommodates a wide range of access control requirements of different granularity. AOP supports the modular implementation of access control while still enables the code to get a hold of the application state. Moreover, framework technology offers a balanced view between reuse and customization. As a result, our framework is able to enforce fine-grained access control for Web applications in a highly adaptable manner.en_US
dc.description.tableofcontents 第一章 導論 .................................... 1
1.1 研究動機 ...................................... 1
1.2 研究目標 ...................................... 3
1.3 本論文的貢獻 .................................. 3
1.4 本論文的限制 .................................. 4
1.5 論文章節架構 .................................. 4
第二章 相關研究與技術背景 ...................... 6
2.1 存取控管(Access Control)..................... 6
2.2 根據角色之存取控管(Role-Based Access Control) 7
2.3 存取控管架構—Reference Monitor ............... 9
2.4 其他相關研究 .................................. 10
2.5 Java認證授權服務(JAAS)....................... 10
2.6 剖面導向程式設計(Aspect-Oriented Programming) 12
2.6.1 AspectJ ..................................... 13
2.6.2 JBossAOP .................................... 16
2.7 研究平台:JPetStore電子寵物商店 ............... 18
第三章 存取控管分析與Web應用程式架構 ........... 20
3.1 存取控管特徵分析 .............................. 20
3.2 存取控管aspect選擇pointcut的評估準則 .......... 23
3.3 Web應用程式架構中pointcut的抉擇 ............... 24
第四章 使用AspectJ實做之存取控管控管框架 ....... 27
4.1對應存取控管之三個aspects ...................... 27
4.1.1 認證(Authentication aspect)................ 28
4.1.2 授權檢查(Precheck aspect).................. 30
4.1.3 資料過濾(Postfilter aspect)................ 31
4.2 aspect 組合之議題 ............................. 34
4.3 aspect組合議題下之另一組實做方式 .............. 35
第五章 Aspect重用及組合機制之探討 .............. 41
5.1 AspectJ的限制 ................................. 41
5.1.1 AspectJ advice的重用性 ...................... 41
5.1.2 AspectJ pointcut的重用性 .................... 44
5.2使用JBossAOP設計之存取控管...................... 47
第六章 結論..................................... 53
參考文獻 .......................................... 55
程式碼列表 ........................................ 59
zh_TW
dc.format.extent 79747 bytes-
dc.format.extent 110892 bytes-
dc.format.extent 106360 bytes-
dc.format.extent 107823 bytes-
dc.format.extent 152041 bytes-
dc.format.extent 337636 bytes-
dc.format.extent 168121 bytes-
dc.format.extent 215127 bytes-
dc.format.extent 191242 bytes-
dc.format.extent 109513 bytes-
dc.format.extent 103207 bytes-
dc.format.extent 113575 bytes-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0927530241en_US
dc.subject (關鍵詞) 存取控管zh_TW
dc.subject (關鍵詞) 剖面導向程式設計zh_TW
dc.subject (關鍵詞) 框架zh_TW
dc.subject (關鍵詞) 網頁應用程式zh_TW
dc.subject (關鍵詞) Access Controlen_US
dc.subject (關鍵詞) Aspect-Oriented Programmingen_US
dc.subject (關鍵詞) Frameworken_US
dc.subject (關鍵詞) Web Applicationsen_US
dc.title (題名) 建構可重用與細緻化的剖面導向存取控管框架zh_TW
dc.title (題名) Building a Reusable and Fine-grained Aspect-Oriented Access Control Frameworken_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 【1】ACM, Proceedings of the 1st International Conference on Aspect-Oriented Software Development, 2001, ACM Press.zh_TW
dc.relation.reference (參考文獻) 【2】ACM, Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2002, ACM Press.zh_TW
dc.relation.reference (參考文獻) 【3】ACM, Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2003, ACM Press.zh_TW
dc.relation.reference (參考文獻) 【4】ACM, Proceedings of the 4th International Conference on Aspect-Oriented Software Development, 2004, ACM Press.zh_TW
dc.relation.reference (參考文獻) 【5】ACM, Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2005, ACM Press.zh_TW
dc.relation.reference (參考文獻) 【6】AOSD Tools Practitioners:zh_TW
dc.relation.reference (參考文獻) http://www.aosd.net/technology/practitioners.phpzh_TW
dc.relation.reference (參考文獻) 【7】Apache Struts Web Application Framework: http://struts.apache.org/zh_TW
dc.relation.reference (參考文獻) 【8】AspectJ website: http://www.eclipse.org/aspectj/zh_TW
dc.relation.reference (參考文獻) 【9】AspectWerkz website: http://aspectwerkz.codehaus.org/index.htmlzh_TW
dc.relation.reference (參考文獻) 【10】R. Anderson, Security Engineering: A Guide to Build Dependable Distributed Systems, John Wiley & Sons, 2001.zh_TW
dc.relation.reference (參考文獻) 【11】K. Beznosov, Y. Deng, Engineering Access Control in Distributed Applications, PhD thesis, Florida International University, Miami, FL, 2000.zh_TW
dc.relation.reference (參考文獻) 【12】A. Clement, A. Colyer and M. Kersten, Aspect-Oriented Programming with AJDT, Workshop on Analysis of Aspect-Oriented Software, ECOOP 2003.zh_TW
dc.relation.reference (參考文獻) 【13】M. Curphey, et al., A Guide to Building Secure Web Applications, The Open Web Application Security Project, Version 1.1, 2002.zh_TW
dc.relation.reference (參考文獻) http://www.cgisecurity.com/owasp/html/zh_TW
dc.relation.reference (參考文獻) 【14】B. De Win and B. De Decker, Building Frameworks in AspectJ, ECOOP 2001, Workshop on Advanced Separation of Concerns, pp.1-6.zh_TW
dc.relation.reference (參考文獻) 【15】B. De Win, W. Joosen and F. Piessens, AOSD & Security:a practical assessment, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03), 2003, pp. 1-6zh_TW
dc.relation.reference (參考文獻) 【16】B. De Win, F. Piessens, W. Joosen and T. Verhanneman, On the importance of the separation-of-concerns principle in secure software engineering, Workshop on the Application of Engineering Principles to System Security Design, 2002.zh_TW
dc.relation.reference (參考文獻) 【17】B. De Win, B. Vanhaute and B. De Decker, How Aspect oriented programming can help to build secure software, Informatica vol.26(2), 2002, pp. 141-149.zh_TW
dc.relation.reference (參考文獻) 【18】B. De Win, B. Vanhaute, B. and De Decker, Security Through Aspect-Oriented Programming, Advances in Network and Distributed Systems Security, Kluwer Academic, pp. 125-138, 2001.zh_TW
dc.relation.reference (參考文獻) 【19】M. Fayad and D. Schmidt, Object-Oriented Application Frameworks, Communications of the ACM. Vol. 40. No. 10, October 1997, pp. 32-38.zh_TW
dc.relation.reference (參考文獻) 【20】E. Gamma, R. Helm, R. Johnson, J. Vlissides: Design Patterns. A.W. L., 1995. ISBN 0-201-63361-2.zh_TW
dc.relation.reference (參考文獻) 【21】L. Giuri, and P. Iglio, Role Templates for Content-Based Access Control, Proceedings, 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA (October 28–29, 1997), pp. 153-59.zh_TW
dc.relation.reference (參考文獻) 【22】R. Goodwin, S. F. Goh and F. Y. Wu, Instance-level access control for business-to-business electronic commerce, IBM System Journal, vol. 41, no. 2, 2002.zh_TW
dc.relation.reference (參考文獻) 【23】S. Hanenberg and A. Schmidmeier, Idioms for Building Software Frameworks in AspectJ, 2nd AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), Boston, MA, March 17, 2003zh_TW
dc.relation.reference (參考文獻) 【24】S. Hanenberg and R. Unland, Using and Reusing Aspects in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA, Oct. 2001zh_TW
dc.relation.reference (參考文獻) 【25】W. Hürsch and C. Videira Lopes, Separation of Concerns, Technical Report, no. NU-CCS-95-03, 1995.zh_TW
dc.relation.reference (參考文獻) 【26】JBoss AOP website: http://www.jboss.org/products/aop,zh_TW
dc.relation.reference (參考文獻) Document download site: http://docs.jboss.org/aop/Aspectframework/zh_TW
dc.relation.reference (參考文獻) 【27】G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm and W. Griswold, Getting Started with AspectJ, Communications of the ACM, vol. 44, no. 10, pp 59-65, October 2001.zh_TW
dc.relation.reference (參考文獻) 【28】G. Kiczales, J. Lamping, A. Menhdhekar , C. Maeda , C. Lopes, J.-M. Loingtier and J. Irwin, , Aspect-oriented programming, in ECOOP `97 Object-Oriented Programming 11th European Conference," Finland (M. Aksit and S. Matsuoka, eds.), vol. 1241, pp. 220-242, New York, NY: Springer-Verlag, 1997.zh_TW
dc.relation.reference (參考文獻) 【29】C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible Team-based Access Control Using Contexts, Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, May 2001.zh_TW
dc.relation.reference (參考文獻) 【30】S. K. Tzelepi1, D. K. Koukopoulos, and G. Pangalos, A flexible Content and Contextbased Access Control Model for Multimedia Medical Image Database Systems. ACM SIGMM Electronic Proceedings, 2001.zh_TW
dc.relation.reference (參考文獻) 【31】C. Lai, L. Gong, L. Koved, A. Nadalin and R. Schemers, User Authentication And Authorization In The Java Platform, Proceedings of Annual Computer Security Applications Conference, Phoenix, Arizona, USA, 1999, pp. 285-290.zh_TW
dc.relation.reference (參考文獻) http://developer.java.sun.com/developer/technicalArticles/Security/jaasv2/zh_TW
dc.relation.reference (參考文獻) 【32】I. Nagy, L. Bergmans, M. Aksit, Declarative Aspect Composition, Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT04), 2004zh_TW
dc.relation.reference (參考文獻) 【33】Open Web Application Security Project: The Top Ten Most Critical Web Application Security Vulnerabilities.zh_TW
dc.relation.reference (參考文獻) http://www.owasp.org/documentation/toptenzh_TW
dc.relation.reference (參考文獻) 【34】H. Ossher and P. Tarr, Using multidimensional separation of concerns to (re)shape evolving software, Communications of the ACM, vol. 44, no. 10, pp 43-50, October 2001.zh_TW
dc.relation.reference (參考文獻) 【35】PROSE website: http://prose.ethz.ch/Wiki.jsp?page=Prosezh_TW
dc.relation.reference (參考文獻) 【36】R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-Based Access Control Models, IEEE Computer, 29(2):38–47, 1996.zh_TW
dc.relation.reference (參考文獻) 【37】D. S. Goldberg, R. B. Findler, M. Flatt, Super and Inner — Together at Last!, OOPSLA 2004, October 2004zh_TW
dc.relation.reference (參考文獻) 【38】T. Verhanneman, L. Jaco, B. De Win, F. Piessens and W. Joosen, Adaptable Access Control Policies for Medical Information Systems, Proc. of Distributed Applications and Interoperable Systems, 2003, Paris, France, LNCS 2893, pp.133-140zh_TW
dc.relation.reference (參考文獻) 【39】E. Wohlstadter, A. Keen, S. Jackson and P. Devanbu, Accommodating Evolution in AspectJ, Workshop on Advanced Separation of Concerns in Object-Oriented Systems, OOPSLA 2001, October 2001zh_TW
dc.relation.reference (參考文獻) 【40】林經緯, 陳恭, 運用剖面導向技術研製網路應用程式之可設定式細緻化存取控管, 第十五屆資訊安全會議(ISC2005),June 2005zh_TW