...
Given knowledge of which operations are sensitive, as well as which specific security checks must be enforced for each operation, an automated tool could reasonably enforce the invariant that the sensitive operations are invoked only from contexts where the required security checks have been performed.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="daf12e91-2c6d-4e0a-8b8e-4a0ec3fdaada"><ac:plain-text-body><![CDATA[ | [[API 2006AA. References#API 06] ] ]]></ac:plain-text-body></ac:structured-macro> |
...