dc.contributor.author |
Eloff, J.H.P.
|
|
dc.contributor.author |
Padayachee, Keshnee
|
|
dc.contributor.author |
Bishop, J.
|
|
dc.date.accessioned |
2011-02-02T11:58:20Z |
|
dc.date.available |
2011-02-02T11:58:20Z |
|
dc.date.issued |
2010 |
|
dc.identifier.uri |
http://hdl.handle.net/10500/3984 |
|
dc.description |
Research article |
en |
dc.description.abstract |
There is a duality between access control and information flow control as both mechanisms are concerned with the flow of information. However, information flow control is more than access control, as an illegal flow might occur even when only authorized requests are performed on an object. Information flow control is inherently difficult to apply, however this does not negate the need for ensuring that information considered to be highly confidential does not flow into objects that may be accessed by users that have lower order security rights. Access control policies are violated in this way by programming errors and there has to be a means of isolating these errors. Programmers often rely on the simple process of source-code instrumentation to trace program flow to discover errors. Program instrumentation is the act of injecting informative statements into software code for the purposes of monitoring. It has been shown that aspect-oriented programming languages are highly suitable for instrumenting object-oriented code for testing purposes This paper advocates that aspect-oriented programming and design may be used to seamlessly instrument a software system to identify information leakage. |
en |
dc.format.extent |
1 online resource (8 leaves) |
en |
dc.language.iso |
en |
en |
dc.subject |
Information flow control |
en |
dc.subject |
Aspect-oriented programming |
en |
dc.subject |
Information leakage |
en |
dc.subject |
Security |
en |
dc.subject |
Access control |
en |
dc.subject.ddc |
005.8 |
|
dc.subject.lcsh |
Data protection -- Security measures |
en |
dc.subject.lcsh |
Computer security -- Computer programs |
en |
dc.subject.lcsh |
Computers -- Access control |
en |
dc.title |
An aspect-oriented approach to tracing information flow |
en |
dc.type |
Article |
en |
dc.description.department |
Computer Science |
en |