dc.contributor.author |
Padayachee, Keshnee
|
|
dc.contributor.author |
Eloff, Jan H. P.
|
|
dc.date.accessioned |
2011-10-11T06:55:57Z |
|
dc.date.available |
2011-10-11T06:55:57Z |
|
dc.date.issued |
2006 |
|
dc.identifier.citation |
Padayachee, K., Eloff J.H.P. 2006, "Aspect-Oriented Implementation of e-Consent to foster Trust", Proceedings of SAICSIT 2006, pp. 164-169. |
en |
dc.identifier.uri |
http://hdl.handle.net/10500/4930 |
|
dc.description.abstract |
As society becomes increasingly dependent on software, there is an increasing expectation of information systems to protect the individual’s right to privacy. The process of attaining electronic consent (e-Consent) may perhaps improve the trust of society in information systems to protect these rights. However, an issue such as e-Consent is usually not given due consideration, as it is a non-functional issue. Hence many systems are implemented without such types of controls and the implementation of the e-consent mechanism in disparate and legacy systems is difficult. Evidently, aspect-oriented software design is highly extensible, as security concerns may be easily integrated into a completed software product. In this paper it is proposed that aspect-oriented programming can be used to augment an existing system with electronic consent. |
en |
dc.format.extent |
1 online resource (6 leaves) |
en |
dc.language.iso |
en |
en |
dc.subject |
Access Control |
en |
dc.subject |
Aspect-Oriented Programming |
en |
dc.subject.ddc |
005.8 |
|
dc.subject.lcsh |
Computer networks -- Security measures |
en |
dc.subject.lcsh |
Telecommunication systems -- Security measures |
en |
dc.subject.lcsh |
Data protection -- Security measures |
en |
dc.subject.lcsh |
Privacy, Right of |
en |
dc.title |
An Aspect-oriented Implementation of e-Consent to foster Trust |
en |
dc.type |
Article |
en |
dc.description.department |
Computer Science |
en |