Privacy via Subsumption
نویسندگان
چکیده
We describe an object calculus that allows both extension of objects and full width subtyping (hiding arbitrary components). In contrast to other proposals, the types of our calculus do not mention “missing” methods. To avoid type unsoundness, the calculus mediates all interaction with objects via “dictionaries” that resemble the method dispatch tables in conventional implementations. Private fields and methods can be modeled and enforced by scoping restrictions: forgetting a field or method through subsumption makes it private. We prove that the type system is sound, give a variant which allows covariant self types, and give some examples of the expressiveness of the calculus.
منابع مشابه
Reusable Strategies for Software Agents via the Subsumption
The subsumption architecture is a layered mediator invented by Rodney Brooks for behaviour-based control of robots. The layers are minimally dependent and use minimal communication. We develop an object-oriented software design for the subsumption architecture, and demonstrate that each layer can be used as a slot for a set of plug-and-play components that implement diierent micro-strategies fo...
متن کاملSubsumption Propagation between Remote Ontologies in Distributed Description Logic
Distributed Description Logics (DDL) is a KR formalism that enables reasoning with multiple ontologies interconnected by directional semantic mapping. Subsumption propagation in DDL from one ontology to another as a result of mappings has been studied, but only for a simplified case when only two ontologies are involved. In this paper we study subsumption propagation in more complex cases, when...
متن کاملAutomatic Compliance of Privacy Policies in Federated Digital Identity
Privacy [13] in the digital world is an important problem which is becoming even more pressing as new collaborative applications are developed. The lack of privacy preserving mechanisms is particularly problematic in federated identity management contexts. In such a context, users can seamlessly interact with a variety of federated web services, through the use of single-sign-on mechanisms and ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAn Enriched UMLS Semantic Network with a Multiple Subsumption Hierarchy
Objective: The Unified Medical Language System’s (UMLS’s) Semantic Network’s (SN’s) two-tree structure is restrictive because it does not allow a semantic type to be a specialization of several other semantic types. In this paper, the SN is expanded into a multiple subsumption structure with a directed acyclic graph (DAG) IS-A hierarchy, allowing a semantic type to have multiple parents. New vi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Comput.
دوره 172 شماره
صفحات -
تاریخ انتشار 2002