G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm et al., An Overview of AspectJ, Proceedings of the 15th European Conference on Object­Oriented Programming (ECOOP'01). LNCS 2072. pp 327­353, 2001.
DOI : 10.1007/3-540-45337-7_18

M. Fleury and F. , The JBoss Extensible Server, Proceedings of the 4th ACM International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware'03). LNCS 2672. pp 344­373, 2003.
DOI : 10.1007/3-540-44892-6_18

R. Laddad, I want my AOP. Separate software concerns with aspect­oriented programming. JavaWorld, 2002.

J. Viega, J. T. Bloch, and P. Chandri, Applying Aspect­ Oriented Programming to Security, Cutter IT Journal, vol.14, issue.2, pp.31-39, 2001.

G. Buehrer, B. Weide, P. Sivilotti, and P. , Using parse tree validation to prevent SQL injection attacks, Proceedings of the 5th international workshop on Software engineering and middleware , SEM '05, pp.106-113, 2005.
DOI : 10.1145/1108473.1108496

W. Halfond and A. Orso, AMNESIA, Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering , ASE '05, pp.174-183, 2005.
DOI : 10.1145/1101908.1101935

W. G. Halfond, J. Viegas, and A. Orso, A Classification of SQL­Injection Attacks and Countermeasures, Proceedings of the International Symposium on Secure Software Engineering, 2006.

R. Mcclure, I. Krüger, and S. Dom, Compile Time Checking of Dynamic SQL Statements, Proceedings of the 27th international conference on Software engineering. p, pp.88-96, 2005.

. Kc, A. Gaurav, V. Keromytis, and . Prevelakis, Countering Code­Injection Attacks With Instruction­Set Randomization, CCS'03, Proceedings of the 10th ACM conference on Computer and communications security, pp.272-280, 2003.
DOI : 10.1145/948143.948146

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.9413

K. Mookhey and N. Burghate, Detection of SQL Injection and Cross­site Scripting Attacks. SecurityFocus, 2004.

A. Newman, App IDS guards databases. Network World, 2005.

T. Pietraszek and C. V. Berghe, Defending Against Injection Attacks through Context­Sensitive String Evaluation, Proceedings of Recent Advances in Intrusion Detection (RAID2005), 2005.
DOI : 10.1007/11663812_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3182

G. Bostrom, Database Encryption as an Aspect, Proceedings of AOSD 2004 Workshop on AOSD Technology for Application­level Security (AOSDSEC), 2004.

R. Laney, J. Van-der-linden, and P. Thomas, Evolution of Aspects for Legacy System Security Concerns, Proceedings of AOSD 2004 Workshop on AOSD Technology for Application­level Security (AOSDSEC), 2004.

M. Huang, C. Wang, and L. Zhang, Toward a Reusable and Generic Security Aspect Library, Proceedings of AOSD 2004 Workshop on AOSD Technology for Application­ level Security (AOSDSEC), 2004.

T. Verhanneman, F. Piessens, B. De-win, and W. Joosen, View Connectors for the Integration of Domain Specific Access Control, Proceedings of AOSD 2004 Workshop on AOSD Technology for Application­level Security (AOSDSEC), 2004.

B. De-win, W. Joosen, and F. Piessens, AOSD & Security: A Practical Assessment, Workshop on Software Engineering Properties of Languages for Aspect Technologies (SPLAT) @ AOSD'03. pp 1­6, 2003.

Z. Zhi-jian and M. Zulkernine, Towards an Aspect­Oriented Intrusion Detection Framework, Computer Software and Applications Conference, 2007.

K. Kawauchi and H. Masuhara, Dataflow Pointcut for Integrity Concerns, Proceedings of AOSD 2004 Workshop on AOSD Technology for Application­level Security (AOSDSEC), 2004.