Abstract
Object composition arises as a natural operation to combine objects in an object-based setting. In our incomplete objects setting it has a strong meaning, as it may combine objects with different internal states. In this paper we study how to make object composition safe in the presence of width subtyping, we propose two solutions, and discuss the alternative ones.
This work has been partially supported by MIUR project EOS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bettini, L., Bono, V., Likavec, S.: A core calculus of mixin-based incomplete objects. In: Proc . FOOL, vol. 11, pp. 29–41 (2004)
Bettini, L., Bono, V., Likavec, S.: Safe and Flexible Objects. In: Proc . SAC 2005, OOPS track, pp. 1258–1263. ACM Press, New York (2005)
Bono, V., Patel, A., Shmatikov, V.: A core calculus of classes and mixins. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 43–66. Springer, Heidelberg (1999)
Bono, V., Patel, A., Shmatikov, V., Mitchell, J.C.: A core calculus of classes and objects. In: Proc . MFPS 1999, vol. 220 (1999)
Crank, E., Felleisen, M.: Parameter-passing and the lambda calculus. In: Proc . POPL 1991, pp. 233–244 (1991)
Felleisen, M., Hieb, R.: The revised report on the syntactic theories of sequential control and state. Theoretical Computer Science 103(2), 235–271 (1992)
Fisher, K., Honsell, F., Mitchell, J.C.: A lambda-calculus of objects and method specialization. Nordic J. of Computing 1(1), 3–37 (1994)
Fisher, K., Mitchell, J.C.: A delegation-based object calculus with subtyping. In: Reichel, H. (ed.) FCT 1995. LNCS, vol. 965, pp. 42–61. Springer, Heidelberg (1995)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)
Mason, I., Talcott, C.: Programming, transforming, and proving with function abstractions and memories. In: Ronchi Della Rocca, S., Ausiello, G., Dezani-Ciancaglini, M. (eds.) ICALP 1989. LNCS, vol. 372, pp. 574–588. Springer, Heidelberg (1989)
Riecke, J.G., Stone, C.A.: Privacy via subsumption. Information and Computation 172(1), 2–28 (2002); A preliminary version appeared in FOOL5
Wright, A., Felleisen, M.: A syntactic approach to type soundness. Information and Computation 115(1), 38–94 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bettini, L., Bono, V., Likavec, S. (2005). Safe Object Composition in the Presence of Subtyping. In: Coppo, M., Lodi, E., Pinna, G.M. (eds) Theoretical Computer Science. ICTCS 2005. Lecture Notes in Computer Science, vol 3701. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560586_11
Download citation
DOI: https://doi.org/10.1007/11560586_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29106-0
Online ISBN: 978-3-540-32024-1
eBook Packages: Computer ScienceComputer Science (R0)