Representation independence, confinement and access control [extended abstract]
- 1 January 2002
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 37 (1) , 166-177
- https://doi.org/10.1145/503272.503289
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- Soundness of data refinement for a higher-order imperative languageTheoretical Computer Science, 2002
- Alias burying: Unique variables without destructive readsSoftware: Practice and Experience, 2001
- Syntactic type abstractionACM Transactions on Programming Languages and Systems, 2000
- SAFKASIACM Transactions on Software Engineering and Methodology, 2000
- Static enforcement of security with typesPublished by Association for Computing Machinery (ACM) ,2000
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- Forward and Backward SimulationsInformation and Computation, 1995
- Parametricity and local variablesJournal of the ACM, 1995
- A behavioral notion of subtypingACM Transactions on Programming Languages and Systems, 1994
- Representation independence and data abstractionPublished by Association for Computing Machinery (ACM) ,1986