Advertisement

Web Mash-Up Development and Security Using AOP

  • Manjusha TatiyaEmail author
  • Sharvari C. Tamane
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 165)

Abstract

In recent years internet web application security is the most necessity. On the contrary, if particular moves are not taken, the solution used maximum likely includes vulnerabilities which may affect the confidentiality, integrity and accessibility of the application. Moreover, statistics involved in the internet programs are frequently easy to exploit. A hacker regularly only wishes a primary web browser to perceive and exploit protection weakness. Software programs, like web mash-up development, suffer from diverse problems like the reduction of modularity, well-stated interfaces that will alert the developer from easily sharing and rehash code developed by another. Shortage of flexible security schemes averts the developer from easy and secure downloading, and combines the source code from many websites over the world. The equivalent origin inclusion shortens get admission to various internet websites. So modularity is a crucial role for social components of mash-up systems. Modularity is the consenting aspects for the big-scale internet and software program growth and reusability of code. It makes likely for many developers to work without instruction from each other. Without accurately stated interfaces, developing adjustment may be apparent to everyone. Shortage of actual modularity is the main deficiency that forestalls internet software and mash-up development in a simple social fashion.

Keywords

Modularity Confidentiality Accessibility 

References

  1. 1.
    Website Sethi, R.: Aspect-oriented programming and security. http://www.symantec.com/connect/articles/aspect-oriented-programming-and-security Publications. 2007, (2010)
  2. 2.
    Felix, J.M., Oviedo: Aspect-oriented programming to improve modularity of object-oriented applications, 9(9), 2454–2460 (2014).  https://doi.org/10.4304/jsw.9.9.pages 2454–2460
  3. 3.
    Yu, J., Benatallah, B., Casati, F., Daniel, F.: Understanding Mashup Development, 12(5), 44–52 (2008)Google Scholar
  4. 4.
    Bader, G., Anjomshoaa, A., Tjoa, A.M.: Privacy aspects of mashup architecture, ACM Publication, 1141–1146 (2010)Google Scholar
  5. 5.
    Kurdi, H.A., Imam Muhammad, Riyadh.: Review on aspect oriented programming, 4(9), 22 (2013)Google Scholar
  6. 6.
    Cappiello, C., Politecnico di M., Daniel, F., Maristella: Information quality in mashups, 14(4), 14–22 (2010)Google Scholar
  7. 7.
    Website Brent Ashley.: Shaping the future of secure Ajax mashups. http://www.ibm.com/developerworks/library/x-securemashups/Pub 3-4-07 Accessed on 8 Nov 2010
  8. 8.
    Magazinius, J., Sabelfeld, A.C., Askarov, A.: A lattice-based approach to mashup security. ACM, 15–23 (2010)Google Scholar
  9. 9.
    Sirbi, K., Kulkarni, P.J.: Stronger enforcement of security using AOP & spring AOP, 2(6), 99–105 (2010), ISSN 2151-9617Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Indira College of Engineering & ManagementParandwadiIndia
  2. 2.JNECAurangabadIndia

Personalised recommendations