Show simple item record

dc.contributor.authorHsu, Nai-Tingen_US
dc.contributor.authorFischer, Charlesen_US
dc.date.accessioned2012-03-15T16:26:04Z
dc.date.available2012-03-15T16:26:04Z
dc.date.created1976en_US
dc.date.issued1976en
dc.identifier.citationTR266en
dc.identifier.urihttp://digital.library.wisc.edu/1793/57974
dc.description.abstractWulf and Shaw [1] have mentioned four deficiencies of Algol-like name scope rules (side effects, indiscriminant access, vulnerability, and no overlapping definition). In this paper a method is proposed to remedy these four deficiencies. This method can also be used to solve part of the confinement problem [8] in system protection at the programming language level. A method which provides for user defined access primitives is also proposed.en_US
dc.format.mimetypeapplication/pdfen_US
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleName Protection in Block Structured Programming Languagesen_US
dc.typeTechnical Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

  • CS Technical Reports
    Technical Reports Archive for the Department of Computer Sciences at the University of Wisconsin-Madison

Show simple item record