MINDS @ UW-Madison

Name Protection in Block Structured Programming Languages

Show simple item record


Files Size Format View
TR266.pdf 1.195Mb application/pdf View/Open
Key Value Language
dc.contributor.author Hsu, Nai-Ting en_US
dc.contributor.author Fischer, Charles en_US
dc.date.accessioned 2012-03-15T16:26:04Z
dc.date.available 2012-03-15T16:26:04Z
dc.date.created 1976 en_US
dc.date.issued 1976 en
dc.identifier.citation TR266 en
dc.identifier.uri http://digital.library.wisc.edu/1793/57974
dc.description.abstract Wulf and Shaw [1] have mentioned four deficiencies of Algol-like name scope rules (side effects, indiscriminant access, vulnerability, and no overlapping definition). In this paper a method is proposed to remedy these four deficiencies. This method can also be used to solve part of the confinement problem [8] in system protection at the programming language level. A method which provides for user defined access primitives is also proposed. en_US
dc.description.provenance Made available in DSpace on 2012-03-15T16:26:04Z (GMT). No. of bitstreams: 1 TR266.pdf: 1195254 bytes, checksum: e7ae7fefac3f9f9b4630e3b2ce8aa012 (MD5) en
dc.description.provenance Create and issued dates reconciled by Wendt Commons staff on 2014-04-17 (JG). en
dc.format.mimetype application/pdf en_US
dc.publisher University of Wisconsin-Madison Department of Computer Sciences en_US
dc.title Name Protection in Block Structured Programming Languages en_US
dc.type Technical Report en_US

Part of

Show simple item record