{"title":"基于aop的J2EE源代码保护","authors":"Xiufeng Zhang, Q. Wen","doi":"10.1109/CIS.WORKSHOPS.2007.181","DOIUrl":null,"url":null,"abstract":"Encryption has become the mainstream to protect Java source code. However, there are defects, one of which is it cannot protect J2EE applications efficiently. This paper firstly analyses the problems encountered when applying this technology to protect J2EE applications, then resolves these problems using AOP technology, and thereby enlarges the range of encryption to protect Java source code.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"AOP-Based J2EE Source Code Protection\",\"authors\":\"Xiufeng Zhang, Q. Wen\",\"doi\":\"10.1109/CIS.WORKSHOPS.2007.181\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Encryption has become the mainstream to protect Java source code. However, there are defects, one of which is it cannot protect J2EE applications efficiently. This paper firstly analyses the problems encountered when applying this technology to protect J2EE applications, then resolves these problems using AOP technology, and thereby enlarges the range of encryption to protect Java source code.\",\"PeriodicalId\":409737,\"journal\":{\"name\":\"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.WORKSHOPS.2007.181\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Encryption has become the mainstream to protect Java source code. However, there are defects, one of which is it cannot protect J2EE applications efficiently. This paper firstly analyses the problems encountered when applying this technology to protect J2EE applications, then resolves these problems using AOP technology, and thereby enlarges the range of encryption to protect Java source code.