Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Policy-Enforced Linking of Untrusted Components (Extended Abstract)
 

Summary: Policy-Enforced Linking of Untrusted Components
(Extended Abstract)
Eunyoung Lee Andrew W. Appel
Department of Computer Science
Princeton University
{elee,appel}@cs.princeton.edu
Categories and Subject Descriptors
D.2.4 [Software Engineering]: Software/Program Verifi-
cation--formal methods, assertion checkers
General Terms
Languages, Security, Verification
Keywords
Linking, component composition, formal logic, proof-carrying
1. INTRODUCTION
Large software systems are often built from loosely-coupled
subsystems. When a programmer uses a third-party soft-
ware component as a building block of her system, she doesn't
want the code she imports to break the whole system. She
needs some methods guaranteeing that linking the foreign
software component to her system is safe.

  

Source: Appel, Andrew W. - Department of Computer Science, Princeton University

 

Collections: Computer Technologies and Information Sciences