Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Namespaces semipermeable membranes for APL applications

Published: 01 September 1981 Publication History

Abstract

Namespaces are proposed as an extension to APL which can provide for large APL applications the same sort of structure and communications control provided in living structures by semipermeable membranes.
Living systems are partitioned by a variety of semipermeable membranes. Those membranes provide protection and isolation for subenvironments of the entity. They also control the flow of information and material between the subenvironments.
Large applications designed for maintainability and extensibility are similar to living systems. They are hierarchically subdivided into simple subunits which are defined in terms of other subunits and which communicate with them in controlled ways.
APL and most other programming environments do not provide suitable means to enforce the isolation and communication control conventions that are appropriate for large applications. Instead isolation depends on the good intentions and discipline of the implementers and the maintenance programmers.

References

[1]
Dahl, O. J., Dijkstra, E. W., and Hoare, C. A. R., Structured Programming, (C) Academic Press, 1972.
[2]
Falkoff, A. D. and Iverson, K. E., APLSV User's Manual: APL Shared Variable System, IBM Publication 5H20-1460, 1973.
[3]
Goldsmith, Leslie H., Dynamic Protection of Objects In a Computer Utility, M.S. Thesis, University of Toronto, April 1981.
[4]
Greenberg, Ira, An Investigation of the Problem of Writing Secure Application Packages in APL, Technical Report, University of Massachusetts at Amherst, 1977.
[5]
Lampson, Butler W., Protection., Proceedings of the 5th Princeton Symposium on Information Science and Systems, March 1971, pp. 437-443.
[6]
Parnas, D. L., A Technique for Software Module Specification with Examples. Communications of the ACM 15, 5 (May, 1972), 330-336.
[7]
Parnas, D. L., On the Criteria to be Used in Decomposing Systems into Modules. Communications of the ACM 15, 12 (December, 1972), 1053-1058.
[8]
Penfield, Paul Jr., Security of APL Application Packages. Fourth International APL User's Conference, June 15 - 16, 1972,
[9]
Puckett, Thomas H., Improved Security in APL Applications Package. Proceedings of the Sixth International APL User's Conference, May 14 - 17, 1974, pp. 438-441.
[10]
Ryan, James L., Secure Applications within an APL Environment. APL Congress 1973, August 22-24, 1973, pp. 407-414.
[11]
Saltzer, Jerome H. and Schroeder, Michael D., The Protection of Information in Computer Systems. Proceedings of the IEEE, 63, 9 (September 1975) pp. 1278-1308.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGAPL APL Quote Quad
ACM SIGAPL APL Quote Quad  Volume 12, Issue 1
September 1981
354 pages
ISSN:0163-6006
DOI:10.1145/390007
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 1981
Published in SIGAPL Volume 12, Issue 1

Check for updates

Author Tags

  1. Exports
  2. Imports
  3. Interfaces
  4. Name-bindings
  5. Namespaces

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)97
  • Downloads (Last 6 weeks)13
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media