Smalltalk-80: the language and its implementation
Smalltalk-80: the language and its implementation
Encapsulation and inheritance in object-oriented programming languages
OOPLSA '86 Conference proceedings on Object-oriented programming systems, languages and applications
Eiffel: the language
The Unified Modeling Language user guide
The Unified Modeling Language user guide
The Java programming language (2nd ed.)
The Java programming language (2nd ed.)
Objects Unencapsulated: Java, Eiffel, and C++??
Objects Unencapsulated: Java, Eiffel, and C++??
The C++ Programming Language, Third Edition
The C++ Programming Language, Third Edition
Object-Oriented Software Construction
Object-Oriented Software Construction
Java Language Specification, Second Edition: The Java Series
Java Language Specification, Second Edition: The Java Series
Formal Syntax and Semantics of Java
Formal Syntax and Semantics of Java
Protection in Programming-Language Translations
ICALP '98 Proceedings of the 25th International Colloquium on Automata, Languages and Programming
Recovering binary class relationships: putting icing on the UML cake
OOPSLA '04 Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Hi-index | 0.00 |
Encapsulation and modularity are supported by variousstatic access control mechanisms that manage implementationhiding and define interfaces adapted to different clientprofiles. Programming languages use numerous and verydifferent mechanisms, the cumulative application of whichis sometimes confusing and hard to predict. Furthermore,understanding and reasoning about access control independentlyfrom the programming languages is quite difficult.Tools based on a language-independent model of accesscontrol are presented to address these issues. These toolssupport access control handling via visualisation of access,checking of design requirements on access and source codegeneration. We believe in the contribution of such tools forimproving understanding and enhancing use of access controlfrom design to implementation.