ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA

被引:0
|
作者
SHEN, J [1 ]
CORMACK, GV [1 ]
机构
[1] UNIV WATERLOO,DEPT COMP SCI,WATERLOO N2L 3G1,ONTARIO,CANADA
来源
COMPUTER LANGUAGES | 1994年 / 20卷 / 02期
关键词
PROGRAMMING LANGUAGE DESIGN; ADA; INFORMATION HIDING; ACCESS CONTROL;
D O I
10.1016/0096-0551(94)90018-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In Ada, private declarations are either totally public or totally opaque. In many circumstances, it is necessary to selectively export some private operations or certain aspects of the hidden representation to some privileged modules. In this paper, we present a mechanism in Ada to gain the access control of private declarations. It is similar to the friend mechanism in C + +, and needs no extension to current Ada.
引用
收藏
页码:117 / 126
页数:10
相关论文
共 50 条
  • [1] Access control for private declarations in Ada
    Shen, Jun, 1600, Pergamon Press Inc, Tarrytown, NY, United States (20):
  • [2] ARCHITECTURAL ACCESS-CONTROL
    KNOPP, SL
    PROGRESSIVE ARCHITECTURE, 1988, 69 (04): : 146 - &
  • [3] ACCESS-CONTROL SOFTWARE
    FRIEDMAN, M
    INFORMATION AGE, 1988, 10 (03): : 157 - 161
  • [4] LANGUAGE FEATURES FOR ACCESS-CONTROL
    ANCILOTTI, P
    BOARI, M
    LIJTMAER, N
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (01) : 16 - 25
  • [5] ACCESS-CONTROL WITH BINARY KEYS
    CHANG, CC
    SHEN, JJ
    WU, TC
    COMPUTERS & SECURITY, 1994, 13 (08) : 681 - 686
  • [6] ACCESS-CONTROL - PRINCIPLES AND PRACTICE
    SANDHU, RS
    SAMARATI, P
    IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) : 40 - 48
  • [7] DATA ACCESS-CONTROL MODEL
    PINKERTON, JMM
    INFORMATION PRIVACY, 1981, 3 (05): : 181 - 185
  • [8] ACCESS-CONTROL AND AUTHENTICATION IN LANS
    GASSER, M
    LOCAL AREA NETWORK SECURITY, 1989, 396 : 19 - 29
  • [9] ACCESS-CONTROL SYSTEMS FOR SECURITY
    MENKUS, B
    OFFICE ADMINISTRATION AND AUTOMATION, 1984, 45 (04): : 57 - &
  • [10] CRYPTANALYSIS ON AN ACCESS-CONTROL IN A HIERARCHY
    CHANG, CC
    FAN, SW
    LIAW, HT
    CHIOU, MY
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1995, 29 (04) : 69 - 72