Using aspect-oriented programming for trustworthy software development

Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Safonov, Vladimir O
Médium: E-kniha Kniha
Jazyk:angličtina
Vydáno: Hoboken, N.J. Wiley 2008
Wiley-Interscience
John Wiley & Sons, Incorporated
Wiley-Blackwell
Vydání:1st ed.
Edice:Quantitative Software Engineering Series
Témata:
ISBN:0470283106, 0470138173, 9780470283103, 9780470138175, 0470283114, 9780470283110
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, in-and-out conditions, and multi-threaded safety can be implemented using AOP. Following an introduction, the book covers: Trustworthy computing, software engineering, and computer science Aspect-oriented programming and Aspect.NET Principles and case studies that apply AOP to TWC Coverage includes Aspect.NET, the AOP framework developed by the author for the Microsoft.NET platform, currently used in seventeen countries. The author discusses the basics of Aspect.NET architecture, its advantages compared to other AOP tools, and its functionality. The book has extensive practical examples and case studies of trustworthy software design and code using the Aspect.NET framework. In addition, the book explores other software technologies and tools for using AOP for trustworthy software development, including Java and AspectJ. This book also includes a valuable chapter dedicated to ERATO, the author's teaching method employed in this book, which has enabled thousands of students to quickly grasp and apply complex concepts in computing and software engineering, while the final chapter presents an overall perspective on the current state of AOP and TWC with a view toward the future. Software engineers, architects, developers, programmers, and students should all turn to this book to learn this tested and proven method to create more secure, private, and reliable computing.
AbstractList Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, in-and-out conditions, and multi-threaded safety can be implemented using AOP. Following an introduction, the book covers: Trustworthy computing, software engineering, and computer science Aspect-oriented programming and Aspect.NET Principles and case studies that apply AOP to TWC Coverage includes Aspect.NET, the AOP framework developed by the author for the Microsoft.NET platform, currently used in seventeen countries. The author discusses the basics of Aspect.NET architecture, its advantages compared to other AOP tools, and its functionality. The book has extensive practical examples and case studies of trustworthy software design and code using the Aspect.NET framework. In addition, the book explores other software technologies and tools for using AOP for trustworthy software development, including Java and AspectJ. This book also includes a valuable chapter dedicated to ERATO, the author's teaching method employed in this book, which has enabled thousands of students to quickly grasp and apply complex concepts in computing and software engineering, while the final chapter presents an overall perspective on the current state of AOP and TWC with a view toward the future. Software engineers, architects, developers, programmers, and students should all turn to this book to learn this tested and proven method to create more secure, private, and reliable computing.
Author Safonov, Vladimir O
Author_xml – sequence: 1
  fullname: Safonov, Vladimir O
BackLink https://cir.nii.ac.jp/crid/1130282270331017728$$DView record in CiNii
BookMark eNpNkE1PAjEQhmsUIyBH73swJh7QmbbbLkchoCQkXvyIp00XWlhZtmu7QPj3FlHDHGYymWfe-WiRs9KWmpArhDsEoPc9mQCXQBOGCCek9ZeAOD1OGqRFASRwFBifkyaXAmVw7IJ0vP-EYFQISJImGb36vJxHyld6Wnety3VZ61lUOTt3arXa14x1Ue3Wvt5aVy92kbem3iqno5ne6MJWq9BySRpGFV53fmObvI2GL4On7uT5cTx4mHSVoCBEFw0knHKgSkgjhNCzzFARc2FMRjOkYqYV01zz2KA0MUiNGSacs0RxIblhbXJ7EFZ-qbd-YYvap5tCZ9YufXr0H2CBvTmw4ZqvtfZ1-oNNw75OFemwP2Ax47gHrw9gmefpNN97RBZkKJVBBwGlDJr_s_N5tc6K3C_Ce9LK5Svldun7eDL86ANgL04Y-wbhzXsl
ContentType eBook
Book
DBID WIIVT
RYH
DEWEY 005.1
DOI 10.1002/9780470283110
DatabaseName Wiley
CiNii Complete
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 0470283106
9780470283103
Edition 1st ed.
1
ExternalDocumentID 9780470283103
EBC353413
BB05204337
WILEYB0019583
GroupedDBID 089
20A
38.
3W6
3X9
3XM
4ST
5VX
A4I
A4J
AABBV
AARDG
ABARN
ABIAV
ABIMR
ABQPQ
ABQPW
ACIQC
ACLGV
ACNAM
ACYFF
ADVEM
AEEBL
AERYV
AFOJC
AHWGJ
AIXPE
AJFER
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
BPBUR
CZZ
GEOUK
HF4
IPJKO
J-X
JFSCD
MYL
PQQKQ
W1A
WIIVT
YPLAZ
ZEEST
RYH
ID FETCH-LOGICAL-a62066-1f0842402a67f666edbf26546ffb2b126dea3e4e45f17f507e1b184438a4674f3
ISBN 0470283106
0470138173
9780470283103
9780470138175
0470283114
9780470283110
IngestDate Wed Oct 15 14:17:29 EDT 2025
Wed Nov 26 07:33:50 EST 2025
Thu Jun 26 22:49:12 EDT 2025
Tue Jul 08 08:28:19 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2007041615
LCCallNum QA76.64 .S253 2008
LCCallNum_Ident QA76.64 .S253 2008
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a62066-1f0842402a67f666edbf26546ffb2b126dea3e4e45f17f507e1b184438a4674f3
Notes Includes bibliographical references (p. 321-328) and index
OCLC 476174763
PQID EBC353413
PageCount 353
ParticipantIDs askewsholts_vlebooks_9780470283103
proquest_ebookcentral_EBC353413
nii_cinii_1130282270331017728
igpublishing_primary_WILEYB0019583
ProviderPackageCode J-X
PublicationCentury 2000
PublicationDate 2008.
c2008
2008
2008-06-09
PublicationDateYYYYMMDD 2008-01-01
2008-06-09
PublicationDate_xml – year: 2008
  text: 2008.
PublicationDecade 2000
PublicationPlace Hoboken, N.J.
PublicationPlace_xml – name: Hoboken, N.J.
– name: Newark
PublicationSeriesTitle Quantitative Software Engineering Series
PublicationYear 2008
Publisher Wiley
Wiley-Interscience
John Wiley & Sons, Incorporated
Wiley-Blackwell
Publisher_xml – name: Wiley
– name: Wiley-Interscience
– name: John Wiley & Sons, Incorporated
– name: Wiley-Blackwell
SSID ssj0000266088
ssib002790642
Score 1.9336209
Snippet Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by...
SourceID askewsholts
proquest
nii
igpublishing
SourceType Aggregation Database
Publisher
SubjectTerms Aspect-oriented programming
Computer software
Computer software -- Development
Computer software -- Reliability
Computers
Development
Reliability
Software Development & Engineering
SubjectTermsDisplay Aspect-oriented programming
Computer software -- Development
Computer software -- Reliability
Computers
Software Development & Engineering
TableOfContents 5.5 Teaching Trustworthy Java Technology -- 5.5.1 Structure of the Java Course -- 5.5.2 Structure of the Java Seminar -- 5.6 Teaching Trustworthy Operating Systems and Networking -- 5.6.1 Structure of the Trustworthy Operating Systems and Networking Course -- 5.7 Teaching Trustworthy Compiler Development -- 5.7.1 Structure of the Trustworthy Compiler Development Course -- 5.7.2 Structure of the Compiler Development Seminar -- 5.8 Summary -- 6. Conclusion -- 6.1 Summary of the Book -- 6.2 Perspectives: Integration of TWC, AOP, Formal Methods, and Knowledge Management -- 6.2.1 Application of Formal Methods to Trustworthy AOP -- 6.2.2 Smart Knowledge-Based AOP -- 6.2.3 AOP Specification and Design Support Tools -- 6.2.4 Trustworthy Reverse Engineering and Refactoring Tools for AOP -- 6.2.5 Aspect-Oriented Modeling on the Basis of Extended UML -- Appendix: Examples of Aspect.NET Aspects -- A.1 TestArgs Example -- A.2 RetTest Example -- A.3 RetTest2 Example -- A.4 QuickSort Example -- A.5 Matrix Example -- References -- Index
3.8.6 Aspect.NET.ML Metalanguage -- 3.8.7 Samples Included in the Aspect.NET 2.1 Release -- 3.8.8 Experience of Aspect.NET Use and User Feedback -- 3.9 Summary -- 3.9.1 AOP -- 3.9.2 Aspect.NET -- 4. Principles and Application of AOP in TWC -- 4.1 AOP and TWC: Cooperation Rather Than Violation -- 4.2 AOP for Security -- 4.3 AOP for Error Handling -- 4.4 AOP for Synchronization -- 4.5 AOP for Trustworthy Multithreading- and Multicore-Based Applications -- 4.6 AOP for Privacy -- 4.7 AOP for Reliability -- 4.7.1 Using AOP to Make Implementation Reliable -- 4.7.2 Using AOP for Software Testing -- 4.7.3 Using AOP to Support Formal Specification and Verification Methods -- 4.8 AOP for Business Integrity -- 4.9 AOP for Design by Contract -- 4.10 Using AOP via Aspect.NET to Improve Productivity and Reliability -- 4.10.1 Effort Estimation Using the COCOMO Model -- 4.10.2 Assessment of Aspect.NET Using the ICED-T Model -- 4.10.3 Assessment of Requirements of Aspect.NET Using the SQFD Model -- 4.11 Application Efficiency and Performance Using AOP -- 4.11.1 Performance Measurement -- 4.11.2 Implementation Details and the Woven IL Code -- 4.11.3 Another Performance Measurement Example -- 4.12 AOP and Agile Programming Approaches -- 4.13 Summary -- 5. Teaching TWC and AOP -- 5.1 The ERATO Teaching Paradigm and the SPBU.NET Project -- 5.1.1 The ERATO Teaching Paradigm -- 5.1.2 The SPBU.NET Project -- 5.2 The T-ERATO Teaching Paradigm and the TrustSPBU.NET Project -- 5.2.1 The T-ERATO Teaching Paradigm -- 5.2.2 The TrustSPBU.NET Project -- 5.3 Teaching Trustworthy Software Engineering, Including AOP -- 5.3.1 Structure of the Secure Software Engineering Course -- 5.4 Teaching Trustworthy .NET and C# Programming -- 5.4.1 Structure of the Trustworthy .NET and C# Programming Course -- 5.4.2 Structure of the .NET and C# Programming Seminar
Intro -- Using Aspect-Oriented Programming for Trustworthy Software Development -- Contents -- Preface -- ACKNOWLEDGMENTS -- 1. Introduction -- 1.1 The Role of Aspect-Oriented Programming in Trustworthiness -- 1.2 Historical Background and Personal Experience -- 1.3 Organization of the Book -- 2. Trustworthy Computing, Software Engineering, and Computer Science -- 2.1 History of and Growing Need for TWC -- 2.2 Microsoft's TWC Initiative -- 2.3 The Four Pillars of TWC -- 2.3.1 Security -- 2.3.2 Privacy -- 2.3.3 Reliability -- 2.3.4 Business Integrity -- 2.4 Software Engineering Technologies and Tools for TWC -- 2.5 TWC and .NET -- 2.5.1 .NET Overview -- 2.5.2 .NET Security -- 2.5.3 .NET and Reliability -- 2.5.4 .NET TWC Tools FxCop and Spec# -- 2.6 TWC and Java -- 2.6.1 Java Overview -- 2.6.2 Java Security -- 2.6.3 Java and Reliability -- 2.6.4 Java TWC Tools -- 2.7 Summary -- 3. Aspect-Oriented Programming and Aspect.NET -- 3.1 History of AOP -- 3.2 AOP Basics -- 3.3 AOP and Related Technologies and Tools -- 3.3.1 AspectJ and AspectWerkz -- 3.3.2 Other AOP Tools and Approaches to Separation of Concerns -- 3.4. Pitfalls of AOP -- 3.5 AOP for Java -- 3.6 AOP for .NET -- 3.7 Aspect.NET Principles and Architecture -- 3.7.1 Motivation and Key Ideas -- 3.7.2 Basic Concepts of AOP -- 3.7.3 Example -- 3.7.4 Representing Aspects by Custom Attributes -- 3.7.5 Example in Terms of Custom Attributes -- 3.7.6 Summary of Our Approach to AOP -- 3.7.7 Aspect.NET Architectural Principles -- 3.7.8 Syntax of AOP Metalanguage (Version 1.0) -- 3.7.9 Another Example -- 3.8 Features and Use of Aspect.NET -- 3.8.1 Prerequisites for Using Aspect.NET 2.1 -- 3.8.2 Previous Releases of Aspect.NET and the Compatibility Mode -- 3.8.3 Aspect.NET Architecture -- 3.8.4 Case Study: Using the Aspect.NET Framework -- 3.8.5 Aspect.NET Framework Options
Title Using aspect-oriented programming for trustworthy software development
URI http://portal.igpublish.com/iglibrary/search/WILEYB0019583.html
https://cir.nii.ac.jp/crid/1130282270331017728
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=353413
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780470283103&uid=none
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PT9swFLag4wCXbYxpjMGiabfKrLaT2L0WlSEN0R2g4hY5ic2ilaQiqGP_Pe-5TkjLYdqBi9VGViy9L3q__N73CPkqYsVtbDnNWMoptmpSFcmMhjbXuQALlzvGm-m5vLhQ19fDn35YQ-3GCciyVA8Pw_mLQg3PAGxsnf0PuNuXwgP4DaDDCrDDuuYRt3_9CCMX9mvXO0kr5C9Gb9IXYN02FZOuycIVBv7t16CD_2DpV_5UOtSmXLStymrh6mCP-5NjdEWnM50Xt8VdfzIzNxXomF9NIqHJG6i1vIFTOtSlHb2tXYksB6HEO0y2HGvyTM8ueVv9PvBQmK9NXaWuHo2wyiYUQm6STYhreuTV9_Hk6kebBIMAMAY155gC_HmiYUVqzvfEqLD328p5O2RH17_BEoCVuK-RafZm3mbuwFMoi-KZfXVOw-Ub0sNGkrdkw5S75HUzPiPw2vQdOXWABWuABR3AAgAs6AAWNIAFHcD2yPR0fHlyRv1YC6pjJM-nzA5UiLdaOpYWwkeTp5ZjU5m1KU8Zj3OjhQlNGFkmLTjshqUQiIdCaZwNY8V70iur0nwggbI2inTKYikx-BXIRwg-dSpVlg45H-6TLx0hJYuZu4Kvk44kBwI2dWWXzJc8J4ljdR-5llIFmw5BoklW4MrwuhtcSzAXAnW65GqffG5knbhDfHFxMh6diAh9pY__eMMB2X76Tj-RHojXHJKtbHFf1HdH_tN5BBJ2UIk
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Using+aspect-oriented+programming+for+trustworthy+software+development&rft.au=Safonov%2C+V.+O.+%28Vladimir+Olegovich%29&rft.date=2008-01-01&rft.pub=Wiley-Interscience&rft.isbn=9780470138175&rft_id=info:doi/10.1002%2F9780470283110&rft.externalDocID=BB05204337
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804702%2F9780470283103.jpg
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fportal.igpublish.com%2Figlibrary%2Famazonbuffer%2FWILEYB0019583_null_0_320.png