Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008)

Taeho Kim, Hong Chul Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Security systems are complex systems that perform multiple functions such as position locating of personnel, entry/exit management of personnel, entrance management, monitoring, logging, tracing, authentication, and authorization. This paper attempts to establish a security system using Aspect Oriented Programming (AOP). Because it is possible to establish a system by completely separating the business logic and security logic of a system using AOP, there is the advantage of being able to clearly identify the roles of each module. Also, doing so enables the establishment of a more flexible system through leveraging the innate advantages of AOP, which are expansion of code reusability and implementation of efficient features.

Original languageEnglish
Title of host publication2008 International Conference on Control, Automation and Systems, ICCAS 2008
Pages863-866
Number of pages4
DOIs
Publication statusPublished - 2008 Dec 1
Event2008 International Conference on Control, Automation and Systems, ICCAS 2008 - Seoul, Korea, Republic of
Duration: 2008 Oct 142008 Oct 17

Other

Other2008 International Conference on Control, Automation and Systems, ICCAS 2008
CountryKorea, Republic of
CitySeoul
Period08/10/1408/10/17

Fingerprint

Aspect oriented programming
Computer systems programming
Security systems
Personnel
Reusability
Authentication
Large scale systems
Monitoring
Industry

Keywords

  • Aspect oriented programming
  • Security system

ASJC Scopus subject areas

  • Control and Systems Engineering

Cite this

Kim, T., & Lee, H. C. (2008). Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008). In 2008 International Conference on Control, Automation and Systems, ICCAS 2008 (pp. 863-866). [4694652] https://doi.org/10.1109/ICCAS.2008.4694652

Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008). / Kim, Taeho; Lee, Hong Chul.

2008 International Conference on Control, Automation and Systems, ICCAS 2008. 2008. p. 863-866 4694652.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, T & Lee, HC 2008, Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008). in 2008 International Conference on Control, Automation and Systems, ICCAS 2008., 4694652, pp. 863-866, 2008 International Conference on Control, Automation and Systems, ICCAS 2008, Seoul, Korea, Republic of, 08/10/14. https://doi.org/10.1109/ICCAS.2008.4694652
Kim T, Lee HC. Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008). In 2008 International Conference on Control, Automation and Systems, ICCAS 2008. 2008. p. 863-866. 4694652 https://doi.org/10.1109/ICCAS.2008.4694652
Kim, Taeho ; Lee, Hong Chul. / Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008). 2008 International Conference on Control, Automation and Systems, ICCAS 2008. 2008. pp. 863-866
@inproceedings{842e456d5f9f44daaf0aeff39643e064,
title = "Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008)",
abstract = "Security systems are complex systems that perform multiple functions such as position locating of personnel, entry/exit management of personnel, entrance management, monitoring, logging, tracing, authentication, and authorization. This paper attempts to establish a security system using Aspect Oriented Programming (AOP). Because it is possible to establish a system by completely separating the business logic and security logic of a system using AOP, there is the advantage of being able to clearly identify the roles of each module. Also, doing so enables the establishment of a more flexible system through leveraging the innate advantages of AOP, which are expansion of code reusability and implementation of efficient features.",
keywords = "Aspect oriented programming, Security system",
author = "Taeho Kim and Lee, {Hong Chul}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/ICCAS.2008.4694652",
language = "English",
isbn = "9788995003893",
pages = "863--866",
booktitle = "2008 International Conference on Control, Automation and Systems, ICCAS 2008",

}

TY - GEN

T1 - Establishment of a Security System using Aspect Oriented Programming (ICCAS 2008)

AU - Kim, Taeho

AU - Lee, Hong Chul

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Security systems are complex systems that perform multiple functions such as position locating of personnel, entry/exit management of personnel, entrance management, monitoring, logging, tracing, authentication, and authorization. This paper attempts to establish a security system using Aspect Oriented Programming (AOP). Because it is possible to establish a system by completely separating the business logic and security logic of a system using AOP, there is the advantage of being able to clearly identify the roles of each module. Also, doing so enables the establishment of a more flexible system through leveraging the innate advantages of AOP, which are expansion of code reusability and implementation of efficient features.

AB - Security systems are complex systems that perform multiple functions such as position locating of personnel, entry/exit management of personnel, entrance management, monitoring, logging, tracing, authentication, and authorization. This paper attempts to establish a security system using Aspect Oriented Programming (AOP). Because it is possible to establish a system by completely separating the business logic and security logic of a system using AOP, there is the advantage of being able to clearly identify the roles of each module. Also, doing so enables the establishment of a more flexible system through leveraging the innate advantages of AOP, which are expansion of code reusability and implementation of efficient features.

KW - Aspect oriented programming

KW - Security system

UR - http://www.scopus.com/inward/record.url?scp=58149083188&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58149083188&partnerID=8YFLogxK

U2 - 10.1109/ICCAS.2008.4694652

DO - 10.1109/ICCAS.2008.4694652

M3 - Conference contribution

AN - SCOPUS:58149083188

SN - 9788995003893

SP - 863

EP - 866

BT - 2008 International Conference on Control, Automation and Systems, ICCAS 2008

ER -