Search For:

Displaying 1-3 out of 3 total
Securing Class Initialization in Java-like Languages
Found in: IEEE Transactions on Dependable and Secure Computing
By Willard Rafnsson,Keiko Nakata,Andrei Sabelfeld
Issue Date:January 2013
pp. 1-13
Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progress has been made on understanding information flow in object-oriented programs, little a...
A Meta-Level Control Architecture for Production Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Toru Ishida, Yutaka Sasaki, Keiko Nakata, Yoshimi Fukuhara
Issue Date:February 1995
pp. 44-52
<p><it>Abstract</it>—Recent production system applications have been experiencing exceedingly difficult software maintenance problems. This is because the control of rule firings has been buried in the production rules themselves. To cope...
Recursive modules for programming
Found in: Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming (ICFP '06)
By Jacques Garrigue, Keiko Nakata
Issue Date:September 2006
pp. 127-134
TheML module system is useful for building large-scale programs. The programmer can factor programs into nested and parameterized modules, and can control abstraction with signatures. Yet ML prohibits recursion between modules. As a result of this constrai...