Name Protection in Block Structured Programming Languages
dc.contributor.author | Hsu, Nai-Ting | en_US |
dc.contributor.author | Fischer, Charles | en_US |
dc.date.accessioned | 2012-03-15T16:26:04Z | |
dc.date.available | 2012-03-15T16:26:04Z | |
dc.date.created | 1976 | en_US |
dc.date.issued | 1976 | en |
dc.identifier.citation | TR266 | en |
dc.identifier.uri | http://digital.library.wisc.edu/1793/57974 | |
dc.description.abstract | Wulf and Shaw [1] have mentioned four deficiencies of Algol-like name scope rules (side effects, indiscriminant access, vulnerability, and no overlapping definition). In this paper a method is proposed to remedy these four deficiencies. This method can also be used to solve part of the confinement problem [8] in system protection at the programming language level. A method which provides for user defined access primitives is also proposed. | en_US |
dc.format.mimetype | application/pdf | en_US |
dc.publisher | University of Wisconsin-Madison Department of Computer Sciences | en_US |
dc.title | Name Protection in Block Structured Programming Languages | en_US |
dc.type | Technical Report | en_US |
Files in this item
This item appears in the following Collection(s)
-
CS Technical Reports
Technical Reports Archive for the Department of Computer Sciences at the University of Wisconsin-Madison