Abstract
The theme of this chapter is controlling access to procedures and data by either hiding them or hiding information about how they are represented. In both cases access is restricted to certain privileged procedures. This may sound like censorship, but inviting procedures written by others to access one’s own data and procedures invites potential misuse and unwanted alterations. We can formalize our theme as the information hiding principle:
Information should only be made available on a need-to-know basis.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer Science+Business Media New York
About this chapter
Cite this chapter
Pearce, J. (1998). Data Control. In: Programming and Meta-Programming in Scheme. Undergraduate Texts in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-1682-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4612-1682-7_5
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4612-7243-4
Online ISBN: 978-1-4612-1682-7
eBook Packages: Springer Book Archive