29th International Conference on Software Engineering (ICSE'07) 2007
DOI: 10.1109/icse.2007.44
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding and Visibility in Interface Specifications

Abstract: Information hiding controls which parts of a class are visible to non-privileged and privileged clients (e.g., subclasses). This affects detailed design specifications in two ways. First, specifications should not expose hidden class members. As noted in previous work, this is important because such hidden members are not meaningful to all clients. But it also allows changes to hidden implementation details without invalidating correctness proofs for client code, which is important for maintaining verified pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 27 publications
(40 reference statements)
0
25
0
Order By: Relevance
“…It's important because it affects design specifications. In other words, certain specifications should be visible whereas it doesn't cause hidden parts to expose [7].…”
Section: ) Acceptormentioning
confidence: 99%
“…It's important because it affects design specifications. In other words, certain specifications should be visible whereas it doesn't cause hidden parts to expose [7].…”
Section: ) Acceptormentioning
confidence: 99%
“…Unlike I set , this is suitable to appear in the module interface, as a public invariant [23] or explicitly conjoined to the procedure specifications of SET . The client does not update the default value, null, of n.own.…”
Section: Dynamic Boundaries and Second Order Framingmentioning
confidence: 99%
“…In our earlier paper [8], we discuss six verification techniques from the literature in terms of our framework, namely those by Poetzsch-Heffter [31], Huizing & Kuiper [14], Leavens & Müller [16], Müller et al [27], and Lu et al [23]. In this paper we concentrate on the techniques based on heap topologies [27,23], because those benefit most from the formalisation in our framework.…”
Section: Instantiationsmentioning
confidence: 99%
“…Some verification techniques exclude the pre-and post-states of so-called helper methods from the visible states [16,17]. Helper methods can easily be expressed in our framework by choosing different parameters for helper and non-helper methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation