Abstract
We prove the correctness of a multi-level partial evaluator and of an information flow analysis for Abadi and Cardelli’s FOb 1 ≤ :, a simply typed object calculus with function and object types, object subtyping and subsumption.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi, M.: Secrecy by typing in security protocols. Journal of the ACM (to appear)
Abadi, M., Banerjee, A., Heintze, N., Riecke, J.: A core calculus of dependency. In: Proceedings of POPL 1999, pp. 147–160. ACM Press, New York (1999)
Abadi, M., Cardelli, L.: A theory of objects. Springer, Heidelberg (1996)
Bell, D., LaPadula, L.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corporation (July 1975)
Bertino, E., Ferrari, E., Samarati, P.: Mandatory security and object-oriented systems: A multilevel entity model and its mapping onto a single-level object model. Theory and Practice of Object Systems 4(3), 183–204 (1998)
Bruce, K.B., Cardelli, L., Pierce, B.C.: Comparing object encodings. Information and Computation (1999); To appear in a special issue with papers from Theoretical Aspects of Computer Software (TACS)
Consel, C., Hornof, L., Marlet, R., Muller, G., Thibault, S., Volanschi, E.-N.: Tempo: Specializing systems applications and beyond. ACM Computing Surveys 30(3) (September 1998); Symposium on Partial Evaluation (SOPE 1998)
Danvy, O., Glück, R., Thiemann, P. (eds.): Partial Evaluation 1996. LNCS, vol. 1110. Springer, Heidelberg (1996)
Denning, D.E.: A lattice model of secure information flow. Communications of the ACM 19(5), 236–243 (1976)
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504–513 (1977)
Glück, R., Jørgensen, J.: An automatic program generator for multi-level specialization. Lisp and Symbolic Computation 10(2), 113–158 (1997)
Gordon, A.D., Hankin, P.D., Lassen, S.B.: Compilation and equivalence of imperative objects. In: Ramesh, S., Sivakumar, G. (eds.) FST TCS 1997. LNCS, vol. 1346, pp. 74–87. Springer, Heidelberg (1997)
Gordon, A.D., Rees, G.D.: Bisimilarity for a first-order calculus of objects with subtyping. In: Proceedings of POPL 1996, pp. 386–395. ACM Press, New York (1996)
Hatcliff, J., Glück, R.: Reasoning about hierarchies of online program specialization systems. In: Danvy, O., et al. (eds.) [8], pp. 161–182.
Heintze, N., Riecke, J.: The SLam calculus: programming with secrecy and integrity. In: Proceedings of POPL 1998, pp. 365–377. ACM Press, New York (1998)
Jones, N., Gomard, C., Sestoft, P.: Partial Evaluation and Automatic Program Generation. Prentice Hall, Englewood Cliffs (1993)
Marquard, M., Steensgaard, B.: Partial evaluation of an object-oriented language. Master’s thesis, Department of Computer Science, Copenhagen University, DIKU (1992)
Myers, A.C.: Jflow: Practical mostly-static information flow control. In: Proceedings of POPL 1999, pp. 228–241. ACM Press, New York (1999)
Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: Proceedings of SOSP 1997, pp. 129–142. ACM Press, New York (1997)
Nielson, F., Nielson, H.R.: Two-level functional languages. Cambridge Tracts In Theoretical Computer Science, vol. 34. Cambridge University Press, Cambridge (1992)
Nielson, F., Nielson, H.R.: Multi-level lambda-calculi: an algebraic description. In: Danvy, O., et al. (eds.) [8], pp. 338–354.
Nielson, F., Nielson, H.R.: Flow analyis for imperative objects. In: Brim, L., Gruska, J., Zlatuška, J. (eds.) MFCS 1998. LNCS, vol. 1450, pp. 220–228. Springer, Heidelberg (1998)
Sabelfeld, A., Sands, D.: A PER model of secure information flow in sequential programs. In: Swierstra, S.D. (ed.) ESOP 1999. LNCS, vol. 1576, pp. 40–58. Springer, Heidelberg (1999)
Sangiorgi, D.: An interpretation of typed objects into typed π-calculus. Information and Computation 143(1), 34–73 (1998)
Schultz, U.P., Lawall, J., Consel, C., Muller, G.: Toward Automatic Specialization of Java Programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 367–390. Springer, Heidelberg (1999)
Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of POPL 1998, pp. 355–364. ACM Press, New York (1998)
Thiemann, P.: A unified framework for binding-time analysis. In: Bidoit, M., Dauchet, M. (eds.) CAAP 1997, FASE 1997, and TAPSOFT 1997. LNCS, vol. 1214. Springer, Heidelberg (1997)
Thiemann, P., Klaeren, H.: What security analysis can do for you or the correctness of a multi-level binding-time analysis. Manuscript (June 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barthe, G., Serpette, B.P. (1999). Partial Evaluation and Non-interference for Object Calculi. In: Middeldorp, A., Sato, T. (eds) Functional and Logic Programming. FLOPS 1999. Lecture Notes in Computer Science, vol 1722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10705424_4
Download citation
DOI: https://doi.org/10.1007/10705424_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66677-6
Online ISBN: 978-3-540-47950-5
eBook Packages: Springer Book Archive