Filters








59,106 Hits in 6.7 sec

Composing aspects with aspects

Antoine Marot, Roel Wuyts
2010 Proceedings of the Eighth International Conference on Aspect-Oriented Software Development - AOSD '10  
We have implemented this new join point model in our Oarta language, an extension of AspectJ, and we show how to use it to write aspects that manage aspect interactions.  ...  Therefore aspects cannot always be composed with other aspects without requiring invasive modifications.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their comments that helped to improve the presentation of the paper.  ... 
doi:10.1145/1739230.1739249 dblp:conf/aosd/MarotW10 fatcat:uguyixoqzfdmbons5wqsoqk3xu

J&

Nathaniel Nystrom, Xin Qi, Andrew C. Myers
2006 Proceedings of the 21st annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications - OOPSLA '06  
For example, two compilers adding different, domain-specific features to Java can be composed to obtain a compiler for a language that supports both sets of features.  ...  Both frameworks support composition of extensions.  ...  The views and conclusions here are those of the authors and do not necessarily reflect those of ONR, the Navy, or the NSF.  ... 
doi:10.1145/1167473.1167476 dblp:conf/oopsla/NystromQM06 fatcat:y2bafjuugbf7vlu5aciqsz6pwa

Model-Driven Information Flow Security for Component-Based Systems [chapter]

Najah Ben Said, Takoua Abdellatif, Saddek Bensalem, Marius Bozga
2014 Lecture Notes in Computer Science  
Two kinds of non-interference properties are formally introduced and for both of them, sufficient conditions that ensures and simplifies the automated verification are proposed.  ...  The security policy is defined and verified from the early steps of the system design.  ...  We provide a set of sufficient syntactic conditions formulated to simplify non-interference verification. These conditions are extensions of security typed language rules applied to our model.  ... 
doi:10.1007/978-3-642-54848-2_1 fatcat:b6tztyjtejfitp2ub5or7pxl3a

J&

Nathaniel Nystrom, Xin Qi, Andrew C. Myers
2006 SIGPLAN notices  
For example, two compilers adding different, domain-specific features to Java can be composed to obtain a compiler for a language that supports both sets of features.  ...  Both frameworks support composition of extensions.  ...  The views and conclusions here are those of the authors and do not necessarily reflect those of ONR, the Navy, or the NSF.  ... 
doi:10.1145/1167515.1167476 fatcat:gtiyfpqqjzbdzbjoauba6rpstq

Extending JML for Modular Specification and Verification of Multi-threaded Programs [chapter]

Edwin Rodríguez, Matthew Dwyer, Cormac Flanagan, John Hatcliff, Gary T. Leavens, Robby
2005 Lecture Notes in Computer Science  
The new constructs rely on the non-interference notion of method atomicity, and allow developers to specify locking and other non-interference properties of methods.  ...  We validate the specification language design by specifying the behavior of a number of complex Java classes designed for use in multi-threaded programs.  ...  Sequentially composing two independent regions yields an independent region, but composing two atomic regions may not yield an atomic region if each region contains a non-mover.  ... 
doi:10.1007/11531142_24 fatcat:ntbim47unnaqjevd35ffj6zs6i

An End-to-End Security Model for Adaptive Service-Oriented Applications [chapter]

Takoua Abdellatif, Marius Bozga
2018 Lecture Notes in Computer Science  
In this paper, we present E2SM, an End-to-End Security Model and a set of algorithms to protect data confidentiality in complex adaptive Serviceoriented applications SOA.  ...  A language based information flow is proposed in [25] to check non-interference but declassification and adaptation are not supported.  ...  An application free of this problem is said to satisfy the non-interference property [8] .  ... 
doi:10.1007/978-3-319-91764-1_4 fatcat:35jg2ek7yfgcfp773jb4jp6s5q

Patch (1) Considered Harmful

Marc E. Fiuczynski, Robert Grimm, Yvonne Coady, David Walker
2005 USENIX Workshop on Hot Topics in Operating Systems  
Moreover, it is a significant challenge to ensure the kernel's correctness when integrating multiple crosscutting concerns.  ...  To make matters worse, developers use simple code merging tools that directly manipulate source file lines instead of relying on a lexical, grammatical, or semantic level of abstraction.  ...  In the rest of this section, we present the proposed aspect-oriented language enhancements to C by example and then discuss our approach to non-interference analysis for aspects.  ... 
dblp:conf/hotos/FiuczynskiGCW05 fatcat:ormxnqcnbvfb7imqtua4bct7ee

Modifying Security Policies for the Satisfaction of Intransitive Non-Interference

M. Yeddes, Feng Lin, N. Ben Hadj-Alouane
2009 IEEE Transactions on Automatic Control  
Intuitively, non-interference ensures the absence of any causal dependency from a high-level domain to a lower-level domain.  ...  Intransitive non-interference (INI), has been proposed in the literature [10] , as a more practical extension to non-interference. INI is formally defined in [18] .  ...  Necessary and sufficient conditions for the solvability of the problem are obtained in terms of a set of linear matrix inequalities (LMIs). The parametrization of all unbiased filters is presented.  ... 
doi:10.1109/tac.2009.2023961 fatcat:xqw734ixvvenlbfy6vs2y4sgfu

Non-interference with What-Declassification in Component-Based Systems

Simon Greiner, Daniel Grahl
2016 2016 IEEE 29th Computer Security Foundations Symposium (CSF)  
For precise analysis, components can be analyzed by separately analysing services provided by a component, and from our compositionality theorem non-interference of components follows.  ...  Component-based design is a method for modular design of systems.  ...  To achieve this, we introduce a notion of non-interference for services, which implies non-interference for components and is suitable for extensions of theorem prover approaches. B.  ... 
doi:10.1109/csf.2016.25 dblp:conf/csfw/GreinerG16 fatcat:luyzc4tkbrgwre5rcsi3ip5n74

A typed monadic embedding of aspects

Nicolas Tabareau, Ismael Figueroa, Éric Tanter
2013 Proceedings of the 12th annual international conference on Aspect-oriented software development - AOSD '13  
of the aspect language. 1 Available, with examples, at  ...  Aspects are first-class, can be deployed dynamically, and the pointcut language is extensible.  ...  Non-interference with the effects of language extensions.  ... 
doi:10.1145/2451436.2451457 dblp:conf/aosd/TabareauFT13 fatcat:qubfxgkr3zgp7l3qk2cfugv4y4

Verifiable Parse Table Composition for Deterministic Parsing [chapter]

August Schwerdfeger, Eric Van Wyk
2010 Lecture Notes in Computer Science  
One obstacle to the implementation of modular extensions to programming languages lies in the problem of parsing extended languages.  ...  The host language parse table and fragments from multiple extensions can then always be efficiently composed to produce a conflict-free parse table for the extended language.  ...  , as described below, also partitions the lexical syntax of extensions and ensures that they do not interfere with each other lexically.  ... 
doi:10.1007/978-3-642-12107-4_15 fatcat:jqa2hdfcjjgmnc4x5jcdr55s4e

Combination of inheritance hierarchies

Harold Ossher, William Harrison
1992 conference proceedings on Object-oriented programming systems, languages, and applications - OOPSLA '92  
Making extensions to existing systems is a critically important activity in object-oriented pro-  ...  One therefore needs conditions different from non-conflict and non-interference to ensure that separate extensions will "work correctly together" when merged.  ...  Their definition of non-interference involves the base version as well as the extensions, so their technique would be applied to Ho, HI D Ho and Hz D HO.  ... 
doi:10.1145/141936.141940 dblp:conf/oopsla/OssherH92 fatcat:pufokt7l3zekjcn7f4zwjpqogi

Syntactic control of interference revisited

P.W. O'Hearn, A.J. Power, M. Takeyama, R.D. Tennent
1999 Theoretical Computer Science  
In "syntactic control of interference" (POPL, 1978), J.C. Reynolds proposes three design principles intended to constrain the scope of imperative state e ects in Algol-like languages.  ...  and simple imperative languages (such as the language of while programs).  ...  The problem of covert interference also a ects language designers.  ... 
doi:10.1016/s0304-3975(98)00359-4 fatcat:pdminj33vreylfd66gbucfcblu

Methods and tools for component-based system design

J Sifakis
2011 2011 Design, Automation & Test in Europe  
With few exceptions, predictability is impossible to guarantee at design time and therefore, a posteriori verification remains the only means for ensuring their correct operation.  ...  It extensively uses compositionality and composability to ensure correctness by avoiding complexity of monolithic verification.  ...  Feature interaction in telecommunication systems, interference among web services, interference in aspect programming are all manifestations of lack of composability.  ... 
doi:10.1109/date.2011.5763166 dblp:conf/date/Sifakis11 fatcat:eeon342hcnao7pcn27cgzbbvom

Syntactic Control of Interference Revisited [chapter]

Peter W. O'Hearn, A. John Power, Makoto Takeyama, Robert D. Tennent
1997 Algol-like Languages  
In \Syntactic Control of Interference" (POPL, 1978), J. C. Reynolds proposes three design principles intended to constrain the scope of imperative state e ects in Algollike languages.  ...  and simple imperative languages (such as the language of while programs).  ...  The Category of Worlds A category of possible worlds appropriate to treating non-interference and passivity in Algol-like languages is de ned as follows.  ... 
doi:10.1007/978-1-4757-3851-3_8 fatcat:ip44qbuiezavvbthmnqhbfnvam
« Previous Showing results 1 — 15 out of 59,106 results