Computer Sciences Dept.

Name Protection in Block Structured Programming Languages

Nai-Ting Hsu, Charles Fischer
1976

Wulf and Shaw [1] have mentioned four deficiencies of Algol-like name scope rules (side effects, indiscriminant access, vulnerability, and no overlapping definition). In this paper a method is proposed to remedy these four deficiencies. This method can also be used to solve part of the confinement problem [8] in system protection at the programming language level. A method which provides for user defined access primitives is also proposed.

Download this report (PDF)


Return to tech report index

 
Computer Science | UW Home