Login / Signup
How secure is AOP and what can we do about it?
Bart De Win
Frank Piessens
Wouter Joosen
Published in:
SESS@ICSE (2006)
Keyphrases
</>
security issues
aspect oriented programming
key management
neural network
software architecture
authentication protocol
authentication scheme
database
learning algorithm
artificial intelligence
software development
lightweight
security protocols