Selective and locally controlled transport of privileges
ACM Transactions on Programming Languages and Systems (TOPLAS) - Lecture notes in computer science Vol. 174
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Communications of the ACM
Intentional resolution of privacy protection in database systems
Communications of the ACM
Use of the concept of transparency in the design of hierarchically structured systems
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
On the criteria to be used in decomposing systems into modules
Communications of the ACM
Protection in programming languages
Communications of the ACM
Modifiability of large software systems
Proceedings of the 14th IBM Computer SCience Symposium on Operating Systems Engineering
Module structure in an evolving family of real time systems
ICSE '79 Proceedings of the 4th international conference on Software engineering
Software development control based on module interconnection
ICSE '79 Proceedings of the 4th international conference on Software engineering
The impact of mesa on system design
ICSE '79 Proceedings of the 4th international conference on Software engineering
The design of the Venus Operating System
SOSP '71 Proceedings of the third ACM symposium on Operating systems principles
The use of abstract data types to simplify program modifications
Proceedings of the 1976 conference on Data : Abstraction, definition and structure
A language extension for controlling access to shared data
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Selective and locally controlled transport of privileges
ACM Transactions on Programming Languages and Systems (TOPLAS) - Lecture notes in computer science Vol. 174
A law-based approach to object-oriented programming
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
IEEE Transactions on Software Engineering
A software development environment for law-governed systems
SDE 3 Proceedings of the third ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
IEEE Transactions on Software Engineering
A procedure and tools for transition engineering
SDE 4 Proceedings of the fourth ACM SIGSOFT symposium on Software development environments
The Darwin software-evolution environment
SDE 1 Proceedings of the first ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
What should we do about the evolution of software: a position paper
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
This paper proposes a technique for what we call localization of power in computer systems, which can be viewed as a generalization of such linguistic disciplines as scope rules, strong typing and data-abstraction. Although the proposed technique is conceptually based on the theory of protection, it is presented as a rather simple extension of the package construct of the Ada language. This technique is expected to be beneficial for software engineering in several ways. In particular:• It facilitates reasoning about large scale systems, by allowing one to ignore most of the details of the system when reasoning about specific aspects of it.• It provides us with a generalization of the conventional concept of data-abstraction, by allowing the formation of several different abstractions for the same type of objects, and by supporting "interactions" between the abstractions of different types.• It allows us to provide parts of a system with a certain ability to control the activity of the rest of it.• It supports a broad spectrum of policies for the design and management of large scale, evolving systems.