1998
DOI: 10.1007/bfb0054091
|View full text |Cite
|
Sign up to set email alerts
|

Flexible alias protection

Abstract: Aliasing is endemic in object oriented programming. Because an object can be modified via any alias, object oriented programs are hard to understand, maintain, and analyse. Flexible alias protection is a conceptual model of inter-object relationships which limits the visibility of changes via aliases, allowing objects to be aliased but mitigating the undesirable effects of aliasing. Flexible alias protection can be checked statically using programmer supplied aliasing modes and imposes no run-time overhead. Us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
204
0

Year Published

2001
2001
2018
2018

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 189 publications
(204 citation statements)
references
References 25 publications
0
204
0
Order By: Relevance
“…A similar notion and analysis could be used in Cgc to identify library methods that do not retain permanent references to their arguments, in order to improve the precision of the LibraryPointsTo set. In addition to the analysis that infers the confinement property, there is a large body of work on type systems that enforce encapsulation by restricting reference aliasing [8,10,12,25].…”
Section: Related Workmentioning
confidence: 99%
“…A similar notion and analysis could be used in Cgc to identify library methods that do not retain permanent references to their arguments, in order to improve the precision of the LibraryPointsTo set. In addition to the analysis that infers the confinement property, there is a large body of work on type systems that enforce encapsulation by restricting reference aliasing [8,10,12,25].…”
Section: Related Workmentioning
confidence: 99%
“…First, Scoped Types enforce a per-owner relation [10,18] via techniques based on Confined Types [9,22]. The type system described here refines the system described in [21] which includes a proof of correctness, but no implementation.…”
Section: Fig 1 Overview Of Stars Application Logic Is Written Accomentioning
confidence: 99%
“…8 shows both the RTSJ version and the STARS version. In the RTSJ version, the runner is a NoHeapRealtimeThread which has in its run() method code to create a new scoped memory (lines [11][12] and a run loop which repeatedly enters the scope passing a detector as argument (lines [17][18].…”
Section: Patterns and Idiomsmentioning
confidence: 99%
“…Mechanisms that achieve information hiding by restricting the visibility of names, e.g., private/protected annotations, are useful but insufficient. They prevent the name of an entity from being used outside a class or package, but do not prevent a reference to an entity from being leaked out of a structure [26].…”
Section: Types For Hierarchic Shapesmentioning
confidence: 99%