Affiliation:
1. Carnegie-Mellon Univ., Pittsburgh, PA
2. Massachusetts Institute of Technology, Cambridge, MA
Abstract
Controlled sharing of information is needed and desirable for many applications and is supported in operating systems by access control mechanisms. This paper shows how to extend programming languages to provide controlled sharing. The extension permits expression of access constraints on shared data. Access constraints can apply both to simple objects, and to objects that are components of larger objects, such as bank account records in a bank's data base. The constraints are stated declaratively, and can be enforced by static checking similar to type checking. The approach can be used to extend any strongly-typed language, but is particularly suitable for extending languages that support the notion of abstract data types.
Publisher
Association for Computing Machinery (ACM)
Reference17 articles.
1. Gypsy
2. Dahl O.J. and Hoare C.A.R. Hierarchical Program Structures. Structured Programming (Dahl Dijkstra and Hoare Eds.) Academic Press 1972.]] Dahl O.J. and Hoare C.A.R. Hierarchical Program Structures. Structured Programming (Dahl Dijkstra and Hoare Eds.) Academic Press 1972.]]
3. Programming semantics for multiprogrammed computations
4. Capability-based addressing
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fabric: Building open distributed systems securely by construction;Journal of Computer Security;2017-07-10
2. A Generative Programming Framework for Context-Aware CSCW Applications;ACM Transactions on Software Engineering and Methodology;2012-03
3. Masked types for sound object initialization;ACM SIGPLAN Notices;2009-01-21
4. Discretionary capability confinement;International Journal of Information Security;2007-09-21
5. A type discipline for authorization policies;ACM Transactions on Programming Languages and Systems;2007-08-02