[{"text":"\n\nAnonymous. The Lobo Pro ject. http://www.lobobrowser.org/.\n\n"},{"text":"\n\nAnonymous. Sans top-20 2007 security risks. http://www.sans.org/top20/, The SANS Institute, 2007.\n\n"},{"text":"\n\nAnonymous. Java International FAQ. http://java.sun.com/javase/technologies/core/ basic/intl/faq.jsp, 09 2008.\n\n"},{"text":"\n\n\nAnis Charfi , Mira Mezini, Using Aspects for Security Engineering of Web Service Compositions, Proceedings of the IEEE International Conference on Web Services, p.59-66, July 11-15, 2005   [doi>10.1109/ICWS.2005.126]\n\n","citation":"1092001"},{"text":"\n\n\nR. Elz , R. Bush, Clarifications to the DNS Specification, RFC Editor, 1997 \n\n"},{"text":"\n\nS. Gao, Y. Deng, H. Yu, X. He, K. Beznosov, and K. Cooper. Applying Aspect-Orientation in Designing Security Systems: A Case Study. In The Sixteenth International Conference on Software Engineering and Knowledge Engineering, 2004.\n\n"},{"text":"\n\n\nCharles B. Haley , Robin C. Laney , Bashar Nuseibeh, Deriving security requirements from crosscutting threat descriptions, Proceedings of the 3rd international conference on Aspect-oriented software development, p.112-121, March 22-24, 2004, Lancaster, UK   [doi>10.1145/976270.976285]\n\n","citation":"976285","doi":"http://doi.acm.org/10.1145/976270.976285"},{"text":"\n\n\nChris Hawblitzel , Chi-Chao Chang , Grzegorz Czajkowski , Deyu Hu , Thorsten von Eicken, Implementing multiple protection domains in java, Proceedings of the annual conference on USENIX Annual Technical Conference, p.22-22, June 15-19, 1998, New Orleans, Louisiana \n\n","citation":"1268278"},{"text":"\n\nM. Huang, C. Wang, and L. Zhang. Toward a Reusable and Generic Security Aspect Library. In AOSD Technology for Application-Level Security Workshop, 2004.\n\n"},{"text":"\n\nA. H. Karp. POLA Today Keeps the Virus at Bay. Technical Report HPL-2003-191, HP Laboratories Palo Alto, 2003.\n\n"},{"text":"\n\n\nGregor Kiczales , Erik Hilsdale , Jim Hugunin , Mik Kersten , Jeffrey Palm , William G. Griswold, An Overview of AspectJ, Proceedings of the 15th European Conference on Object-Oriented Programming, p.327-353, June 18-22, 2001 \n\n","citation":"680006"},{"text":"\n\nL. Koved, M. Pistoia, and A. Kershenbaum. Access 2002.\n\n"},{"text":"\n\n\nLap Chung Lam , Tzi-cker Chiueh, A General Dynamic Information Flow Tracking Framework for Security Applications, Proceedings of the 22nd Annual Computer Security Applications Conference, p.463-472, December 11-15, 2006   [doi>10.1109/ACSAC.2006.6]\n\n","citation":"1191901"},{"text":"\n\nA. Mettler and D. Wagner. The Joe-E Language Specification (draft). University of California, June 2006.\n\n"},{"text":"\n\nM. S. Miller and J. S. Shapiro. Paradigm Regained: Abstraction Mechanisms for Access Control. In Asian Computing Conference, 2003.\n\n"},{"text":"\n\n\nAzzam Mourad , Marc-Andre Laverdiere , Mourad Debbabi, A High-level Aspect-oriented-based Framework for Software Security Hardening, Information Security Journal: A Global Perspective, v.17 n.2, p.56-74, March 2008   [doi>10.1080/19393550801911230]\n\n","citation":"1451919"},{"text":"\n\nK. Padayachee and J. Elo. Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, chapter An Aspect-Oriented Model to Monitor Misuse, pages 273--278. Springer Netherlands, 09 2007.\n\n"},{"text":"\n\nB. Pasero. RSSOwl. http://www.rssowl.org/.\n\n"},{"text":"\n\n\nNiels Provos , Markus Friedl , Peter Honeyman, Preventing privilege escalation, Proceedings of the 12th conference on USENIX Security Symposium, p.16-16, August 04-08, 2003, Washington, DC \n\n","citation":"1251369"},{"text":"\n\n\nAndrew Prunicki , Tzilla Elrad, Aclamate: An AOSD Security Framework for Access Control, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, p.293-300, September 29-October 01, 2006   [doi>10.1109/DASC.2006.16]\n\n","citation":"1170177"},{"text":"\n\nJ. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Communications of the ACM, volume 17, 7, 1974.\n\n"},{"text":"\n\nM. Stiegler, A. H. Karp, K.-P. Yee, and M. S. Miller. Polaris: Virus Safe Computing for Windows XP. Technical Report HP:-2004-221, HP Laboratories Palo Alto, 2004.\n\n"},{"text":"\n\n\nDavid Wagner, Object capabilities for security, Proceedings of the 2006 workshop on Programming languages and analysis for security, p.1-2, June 10-10, 2006, Ottawa, Ontario, Canada   [doi>10.1145/1134744.1134745]\n\n","citation":"1134745","doi":"http://doi.acm.org/10.1145/1134744.1134745"},{"text":"\n\n\nRobert J. Walker , Kevin Viggers, Implementing protocols via declarative event patterns, Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, October 31-November 06, 2004, Newport Beach, CA, USA   [doi>10.1145/1029894.1029918]\n\n","citation":"1029918","doi":"http://doi.acm.org/10.1145/1029894.1029918"},{"text":"\n\nB. D. Win, V. Shah, W. Joosen, and R. Bodkin. Report of the AOSD2004 workshop on AOSD technology for application-level security. Technical report, Department of Computer Science, K.U.Leuven, Leuven, Belgium, 2005.\n\n"},{"text":"\n\n\nBart De Win , Bart Vanhaute , Bart De Decker, Security Through Aspect-Oriented Programming, Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security, p.125-138, November 26-27, 2001 \n\n ","citation":"710569"},{"text":"\n\n\nKa-Ping Yee, User Interaction Design for Secure Systems, Proceedings of the 4th International Conference on Information and Communications Security, p.278-290, December 09-12, 2002 \n\n","citation":"687663"},{"text":"\n\n\nZhi Jian Zhu , Mohammad Zulkernine, Towards an Aspect-Oriented Intrusion Detection Framework, Proceedings of the 31st Annual International Computer Software and Applications Conference, p.637-638, July 24-27, 2007   [doi>10.1109/COMPSAC.2007.218]\n\n","citation":"1299760"}]