Framework for Trustworthy Software Development

Author(s):  
Jagadeesh Chandra Bose R P ◽  
Kapil Singi ◽  
Vikrant Kaulgud ◽  
Kanchanjot Kaur Phokela ◽  
Sanjay Podder
Author(s):  
Vladimir O. Safonov

This chapter covers the use of aspect-oriented programming (AOP) and Aspect.NET, an AOP toolkit for the .NET platform, to implement Web and 3D Web security and privacy. In this chapter the author shows that AOP is quite suitable as a trustworthy software development tool. AOP and Aspect.NET basics are overviewed using simple examples. Principles of applying Aspect.NET for Web and 3D Web security and privacy implementation are also discussed. The chapter presents a library of sample aspects implementing security and privacy for Web programming.


Cyber Crime ◽  
2013 ◽  
pp. 1797-1839 ◽  
Author(s):  
Vladimir O. Safonov

This chapter covers the use of aspect-oriented programming (AOP) and Aspect.NET, an AOP toolkit for the .NET platform, to implement Web and 3D Web security and privacy. In this chapter the author shows that AOP is quite suitable as a trustworthy software development tool. AOP and Aspect.NET basics are overviewed using simple examples. Principles of applying Aspect.NET for Web and 3D Web security and privacy implementation are also discussed. The chapter presents a library of sample aspects implementing security and privacy for Web programming.


2011 ◽  
Vol 225-226 ◽  
pp. 870-873
Author(s):  
Zhen Li ◽  
Hong Yun Cai ◽  
Jun Feng Tian ◽  
Fang Zhang

In order to develop the trustworthy software, the paper merges the software trustworthiness into software life cycle and proposes a new approach for trustworthy software development. The software behavior and results can be expected and the behavior states can be monitored during software running by introducing the trustworthy behavior trace of software. In the software design phase, we inserted checkpoint sensor at each checkpoint of trustworthy software; in the software testing phase, we created the trustworthy behavior trace of software and updated it for software update. The experimental results show that the software developed with our approach can detect the anomaly of software successfully and verify the effectiveness of our approach.


Sign in / Sign up

Export Citation Format

Share Document