Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4435))

Included in the following conference series:

  • 451 Accesses

Abstract

We aim to provide information hiding support in concurrent object-oriented programming languages. We study this issue both at the object level and the class level, in the context of an object-oriented extension of Join — a process calculus in the tradition of the π-calculus.

In this extended abstract, we focus on the class level and design a new hiding operation on classes. The purpose of this operation is to prevent part of parent classes from being visible in client (inheriting) classes. We define its formal semantics in terms of α-converting hidden names to fresh names, and its typing in terms of eliminating hidden names from class types.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruce, K., Cardelli, L., Castagna, G., Leavens, G.T., Pierce, B.: On binary methods. Theory and Practice of Object Systems 1(3), 221–242 (1995)

    Google Scholar 

  2. Fisher, K., Reppy, J.: The design of a class mechanism for MOBY. In: Proceedings of PLDI 1999, pp.37–49 (1999)

    Google Scholar 

  3. Fournet, C., Gonthier, G.: The reflexive chemical abstract machine and the join-calculus. In: Proceedings of POPL 1996, pp. 372–385 (1996)

    Google Scholar 

  4. Fournet, C., Maranget, L., Laneve, C., Rémy, D.: Implicit typing à la ML for the join-calculus. In: Proceedings of CONCUR 1997, pp. 196–212 (1997)

    Google Scholar 

  5. Fournet, C., Maranget, L., Laneve, C., Rémy, D.: Inheritance in the join calculus. Journal of Logic and Algebraic Programming 57(1-2), 23–69 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  6. Gordon, A.D., Hankin, P.D.: A concurrent object calculus: reduction and typing. In: Proceedings of HLCL 1998, pp. 248–264 (1998)

    Google Scholar 

  7. Ma, Q., Maranget, L.: Expressive synchronization types for inheritance in the join calculus. In: Proceedings of APLAS 2003, pp. 20–36 (2003)

    Google Scholar 

  8. Ma, Q., Maranget, L.: Information hiding, inheritance and concurrency. Inria Rocquencourt Research Report RR-5631 (2005)

    Google Scholar 

  9. Matsuoka, S., Yonezawa, A.: Analysis of inheritance anomaly in object-oriented concurrent programming languages. In: Research Directions in Concurrent Object-Oriented Programming, pp. 107–150. MIT Press, Cambridge (1993)

    Google Scholar 

  10. Milicia, G., Sassone, V.: The inheritance anomaly: ten years after. In: Proceedings of SAC 1996, pp. 1267–1274 (2004)

    Google Scholar 

  11. Odersky, M.: Functional nets. In: Proceedings of ESOP 2000, pp. 1–25 (2000)

    Google Scholar 

  12. Riecke, J.G., Stone, C.A.: Privacy via subsumption. Information and Computation 172(1), 2–28 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  13. Vouillon, J.: Combining subsumption and binary methods: an object calculus with views. In: Proceedings of POPL 2001, pp. 290–303 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Mitsu Okada Ichiro Satoh

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, Q., Maranget, L. (2007). Information Hiding in the Join Calculus. In: Okada, M., Satoh, I. (eds) Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues. ASIAN 2006. Lecture Notes in Computer Science, vol 4435. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77505-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77505-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77504-1

  • Online ISBN: 978-3-540-77505-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics