메뉴 건너뛰기




Volumn 376, Issue 3, 2007, Pages 205-224

Observational purity and encapsulation

Author keywords

Benevolent side effects; Information hiding; Specification and verification

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; COMPUTER SOFTWARE; DATA PRIVACY; REAL TIME SYSTEMS; SPECIFICATION LANGUAGES;

EID: 34247472572     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2007.02.004     Document Type: Article
Times cited : (30)

References (39)
  • 1
    • 0036040498 scopus 로고    scopus 로고
    • A. Banerjee, D.A. Naumann, Representation independence, confinement and access control, in: ACM Symposium on Principles of Programming Languages, POPL, 2002, pp. 166-177
  • 2
    • 33745220946 scopus 로고    scopus 로고
    • Ownership confinement ensures representation independence for object-oriented programs
    • (Extended version of [1])
    • Banerjee A., and Naumann D.A. Ownership confinement ensures representation independence for object-oriented programs. Journal of the ACM 52 6 (2005) 894-960 (Extended version of [1])
    • (2005) Journal of the ACM , vol.52 , Issue.6 , pp. 894-960
    • Banerjee, A.1    Naumann, D.A.2
  • 3
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • Language Based Security (special issue)
    • Banerjee A., and Naumann D.A. Stack-based access control for secure information flow. Language Based Security. Journal of Functional Programming 15 2 (2005) 131-177 (special issue)
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 26444459810 scopus 로고    scopus 로고
    • A. Banerjee, D.A. Naumann, State based ownership, reentrance, and encapsulation, in: European Conference on Object-Oriented Programming, ECOOP, 2005, pp. 387-411
  • 5
    • 4644269527 scopus 로고    scopus 로고
    • Verification of object-oriented programs with invariants
    • ECOOP 2003 Workshop on Formal Techniques for Java-like Programs (special issue)
    • Barnett M., DeLine R., Fähndrich M., Leino K.R.M., and Schulte W. Verification of object-oriented programs with invariants. ECOOP 2003 Workshop on Formal Techniques for Java-like Programs. Journal of Object Technology 3 6 (2004) 27-56 (special issue)
    • (2004) Journal of Object Technology , vol.3 , Issue.6 , pp. 27-56
    • Barnett, M.1    DeLine, R.2    Fähndrich, M.3    Leino, K.R.M.4    Schulte, W.5
  • 6
    • 19044390891 scopus 로고    scopus 로고
    • The Spec# programming system: An overview
    • Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop. Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds). CASSIS 2004, Springer Revised selected papers
    • Barnett M., Leino K.R.M., and Schulte W. The Spec# programming system: An overview. In: Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds). Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop. CASSIS 2004. LNCS vol. 3362 (2005), Springer 49-69 Revised selected papers
    • (2005) LNCS , vol.3362 , pp. 49-69
    • Barnett, M.1    Leino, K.R.M.2    Schulte, W.3
  • 7
    • 34247529850 scopus 로고    scopus 로고
    • M. Barnett, D.A. Naumann, W. Schulte, Q. Sun, 99.44% pure: Useful abstractions in specifications, in: ECOOP Workshop on Formal Techniques for Java-like Programs, FTfJP, Technical Report NIII-R0426, University of Nijmegen. 2004
  • 8
    • 33746628954 scopus 로고    scopus 로고
    • M. Barnett, D.A. Naumann, W. Schulte, Q. Sun, Allowing state changes in specifications, in: International Conference on Emerging Trends in Information and Communication Security, ETRICS, in: Springer LNCS, vol. 3995, 2006, pp. 321-336. Extended version of [7]
  • 9
    • 4944265699 scopus 로고    scopus 로고
    • G. Barthe, P.R. D'Argenio, T. Rezk, Secure information flow by self-composition, in: Proceedings of the 17th IEEE Computer Security Foundations Workshop, CSFW'04, 2004, pp. 100-114
  • 10
    • 2442575906 scopus 로고    scopus 로고
    • N. Benton, Simple relational correctness proofs for static analyses and program transformations, in: ACM Symposium on Principles of Programming Languages, POPL, 2004, pp. 14-25
  • 11
    • 0038575343 scopus 로고    scopus 로고
    • C. Boyapati, B. Liskov, L. Shrira, Ownership types for object encapsulation, in: ACM Symposium on Principles of Programming Languages, POPL, 2003, pp. 213-223
  • 12
    • 0037432671 scopus 로고    scopus 로고
    • Program logic and equivalence in the presence of garbage collection
    • Calcagno C., O'Hearn P., and Bornat R. Program logic and equivalence in the presence of garbage collection. Theoretical Computer Science 298 3 (2003) 557-581
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 557-581
    • Calcagno, C.1    O'Hearn, P.2    Bornat, R.3
  • 13
    • 84937396698 scopus 로고    scopus 로고
    • Forward simulation for data refinement of classes
    • Formal Methods Europe. Eriksson L., and Lindsay P.A. (Eds), Springer
    • Cavalcanti A.L.C., and Naumann D.A. Forward simulation for data refinement of classes. In: Eriksson L., and Lindsay P.A. (Eds). Formal Methods Europe. LNCS vol. 2391 (2002), Springer 471-490
    • (2002) LNCS , vol.2391 , pp. 471-490
    • Cavalcanti, A.L.C.1    Naumann, D.A.2
  • 16
    • 27744504698 scopus 로고    scopus 로고
    • Reasoning with specifications containing method calls and model fields
    • ECOOP 2004 Workshop FTfJP (special issue)
    • Cok D.R. Reasoning with specifications containing method calls and model fields. ECOOP 2004 Workshop FTfJP. Journal of Object Technology 4 8 (2005) 77-103 (special issue)
    • (2005) Journal of Object Technology , vol.4 , Issue.8 , pp. 77-103
    • Cok, D.R.1
  • 17
    • 33746306739 scopus 로고    scopus 로고
    • A. Darvas, P. Müller, Reasoning about method calls in interface specifications, in: ECOOP 2005 Workshop FTfJP, June 2006, Journal of Object Technology 5 (5) (2006) 59-85 (special issue)
  • 19
    • 0036036098 scopus 로고    scopus 로고
    • C. Flanagan, K.R.M. Leino, M. Lillibridge, G. Nelson, J.B. Saxe, R. Stata, Extended static checking for Java, in: ACM Conference on Programming Language Design and Implementation, PLDI, 2002, pp. 234-245
  • 20
    • 0003714504 scopus 로고
    • Larch: Languages and tools for formal specification
    • Guttag J.V., and Horning J.J. (Eds), Springer-Verlag With Stephen J. Garland, Kevin D. Jones, Andrés Modet, and Jeannette M. Wing
    • Larch: Languages and tools for formal specification. In: Guttag J.V., and Horning J.J. (Eds). Texts and Monographs in Computer Science (1993), Springer-Verlag With Stephen J. Garland, Kevin D. Jones, Andrés Modet, and Jeannette M. Wing
    • (1993) Texts and Monographs in Computer Science
  • 21
    • 85034864446 scopus 로고
    • Data refinement refined (resumé)
    • European Symposium on Programming, Springer
    • He J., Hoare C.A.R., and Sanders J. Data refinement refined (resumé). European Symposium on Programming. LNCS vol. 213 (1986), Springer
    • (1986) LNCS , vol.213
    • He, J.1    Hoare, C.A.R.2    Sanders, J.3
  • 22
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • 583
    • Hoare C.A.R. An axiomatic basis for computer programming. Communications of the ACM 12 (1969) 576-580 583
    • (1969) Communications of the ACM , vol.12 , pp. 576-580
    • Hoare, C.A.R.1
  • 23
    • 0015482118 scopus 로고
    • Proofs of correctness of data representations
    • Hoare C.A.R. Proofs of correctness of data representations. Acta Informatica 1 (1972) 271-281
    • (1972) Acta Informatica , vol.1 , pp. 271-281
    • Hoare, C.A.R.1
  • 24
    • 0002820732 scopus 로고
    • The Geneva Convention on the treatment of object aliasing
    • Hogg J., Lea D., Wills A., deChampeaux D., and Holt R. The Geneva Convention on the treatment of object aliasing. OOPS Messenger 3 2 (1992) 11-16
    • (1992) OOPS Messenger , vol.3 , Issue.2 , pp. 11-16
    • Hogg, J.1    Lea, D.2    Wills, A.3    deChampeaux, D.4    Holt, R.5
  • 25
    • 0142245536 scopus 로고    scopus 로고
    • How the design of JML accommodates both runtime assertion checking and formal verification
    • Formal Methods for Components and Objects. de Boer F.S., Bonsangue M.M., Graf S., and de Roever W.-P. (Eds). FMCO 2002, Springer
    • Leavens G.T., Cheon Y., Clifton C., Ruby C., and Cok D.R. How the design of JML accommodates both runtime assertion checking and formal verification. In: de Boer F.S., Bonsangue M.M., Graf S., and de Roever W.-P. (Eds). Formal Methods for Components and Objects. FMCO 2002. LNCS vol. 2852 (2003), Springer 262-284
    • (2003) LNCS , vol.2852 , pp. 262-284
    • Leavens, G.T.1    Cheon, Y.2    Clifton, C.3    Ruby, C.4    Cok, D.R.5
  • 30
    • 33646038128 scopus 로고    scopus 로고
    • Springer
    • Müller P. Modular Specification and Verification of Object-Oriented Programs. LNCS vol. 2262 (2002), Springer
    • (2002) LNCS , vol.2262
    • Müller, P.1
  • 31
    • 24644490287 scopus 로고    scopus 로고
    • Observational purity and encapsulation
    • Fundamental Aspects of Software Engineering (FASE). Cerioli M. (Ed), Springer
    • Naumann D.A. Observational purity and encapsulation. In: Cerioli M. (Ed). Fundamental Aspects of Software Engineering (FASE). LNCS vol. 3442 (2005), Springer 190-204
    • (2005) LNCS , vol.3442 , pp. 190-204
    • Naumann, D.A.1
  • 32
    • 33750232981 scopus 로고    scopus 로고
    • D.A. Naumann, From coupling relations to mated invariants for secure information flow and data abstraction, in: European Symposium on Research in Computer Security, ESORICS, in: Springer LNCS, vol. 4189, 2006, pp. 279-296
  • 33
    • 4544323610 scopus 로고    scopus 로고
    • D.A. Naumann, M. Barnett, Towards imperative modules: Reasoning about invariants and sharing of mutable state (extended abstract), in: IEEE Symposium on Logic in Computer Science, LICS, 2004, pp. 313-323
  • 34
    • 33750236160 scopus 로고    scopus 로고
    • Towards imperative modules: Reasoning about invariants and sharing of mutable state
    • Extended version of [33]
    • Naumann D.A., and Barnett M. Towards imperative modules: Reasoning about invariants and sharing of mutable state. Theoretical Computer Science 365 (2006) 143-168 Extended version of [33]
    • (2006) Theoretical Computer Science , vol.365 , pp. 143-168
    • Naumann, D.A.1    Barnett, M.2
  • 35
    • 26444468933 scopus 로고    scopus 로고
    • Controlling object allocation using creation guards
    • Proceedings, Formal Methods, Springer
    • Pierik C., Clarke D., and de Boer F.S. Controlling object allocation using creation guards. Proceedings, Formal Methods. LNCS vol. 3582 (2005), Springer 59-74
    • (2005) LNCS , vol.3582 , pp. 59-74
    • Pierik, C.1    Clarke, D.2    de Boer, F.S.3
  • 37
    • 34247484811 scopus 로고    scopus 로고
    • A. Sǎlcianu, M. Rinard, A combined pointer and purity analysis for Java programs, Tech. Rep. MIT-CSAIL-TR-949, Department of Computer Science, Massachusetts Institute of Technology. 2004
  • 38
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • 12th International Static Analysis Symposium. SAS, Springer
    • Terauchi T., and Aiken A. Secure information flow as a safety problem. 12th International Static Analysis Symposium. SAS. LNCS vol. 3672 (2005), Springer 352-367
    • (2005) LNCS , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 39
    • 34047152892 scopus 로고    scopus 로고
    • H. Yang, Relational separation logic, Theoretical Computer Science, 2007 (in press)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.