This report summarizes the presentations, discussions, and outcomes of the ecoop’2000 Workshop on object Interoperability, held in Sophia Antipolis, France, on Monday, June 12, 2000. Divided into four main sessions, ...
详细信息
There is considerable interest in programs that can migrate from one host to another and execute, Mobile programs are appealing because they support efficient utilization of network resources and extensibility of info...
详细信息
There is considerable interest in programs that can migrate from one host to another and execute, Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host's protected resources. In this paper, we present a novel approach for controlling and protecting a site's resources. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to resources, A set of code transformation tools enforces these constraints on mobile programs by integrating the access constraint checking code directly into the mobile program and resource definitions, Using this approach, a site does not need to explicitly include calls to reference monitors in order to protect resources. The performance analysis show that the approach performs better than reference monitor-based approaches in many cases. Copyright (C) 2000 John Wiley & Sons, Ltd.
The aim of the First ecoop Workshop on XML and object Technology was to bring together researchers working in the objectoriented field to discuss how object-oriented technology can be exploited in data management sol...
详细信息
This work focuses on architectural recovery for program understanding and reuse reengineering of legacy object-oriented systems. The proposed method is based on dynamic analysis of the system for the selected test cas...
详细信息
This work focuses on architectural recovery for program understanding and reuse reengineering of legacy object-oriented systems. The proposed method is based on dynamic analysis of the system for the selected test cases that cover relevant use cases. The theory of formal concept analysis is applied to decompose the logical hierarchy of subsystems, so that parts of the system which implement similar functionality are grouped together.
Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility...
详细信息
ISBN:
(纸本)3540415130
Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components ? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domain-specific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be;at which level of granularity security has to be designed and introduced into the application;why solutions differing from classical cryptography-based solutions are promising.
The suitability of the object-orientedprogramming model for implementing distributed systems has lead to middleware platforms, such as CORBA, DCOM, and Java/RMI. Originally, these middleware systems aimed at distribu...
详细信息
ISBN:
(纸本)3540415130
The suitability of the object-orientedprogramming model for implementing distributed systems has lead to middleware platforms, such as CORBA, DCOM, and Java/RMI. Originally, these middleware systems aimed at distribution transparency for Application programmers. However, distributed systems axe exposed to system issues, such as dynamic performance changes or partial errors, which prevent complete distribution transparency. Quality of Service (QoS) management addresses these system issues. The goal is to add QoS management to the interactions between clients and services. Support for QoS management in distributed object systems is a hot topic of current research which poses a number of open questions: How is QoS integrated with the object model that emphasizes encapsulation and information hiding? Can one build generic support frameworks for multiple QoS categories, in contrast to specialized, single category systems, such as TAO, Electra, Eternal, DOORS among others. Can QoS be viewed as an aspect in the sense of Aspect orientedprogramming (AOP) or are other classifications more appropriate? This ecoop-workshop has discussed the open questions and aimed at a summary of the state of the art in the field. The workshop stimulated discussions about how next generation QoS management facilities can be built into object infrastructures.
This document describes the results of the two-day Workshop on Aspects and Dimensions of Concern at ecoop 2000. The workshop produced the beginnings of a set of goals, requirements, and issues to be addressed by appro...
详细信息
The objective of this workshop was to discuss current tools and environments for learning object-oriented concepts and to share ideas and experiences about the usage of computer support to teach the basic concepts of ...
详细信息
In objectorientedprogramming, it is sometimes necessary to copy objects and to compare them for equality or inequality. We discuss some of the issues involved in copying and comparing objects and we address the prob...
详细信息
ISBN:
(纸本)3540676600
In objectorientedprogramming, it is sometimes necessary to copy objects and to compare them for equality or inequality. We discuss some of the issues involved in copying and comparing objects and we address the problem of generating appropriate copying and comparing operations automatically, a service that is not provided by most objectoriented languages and environments. Automatic generation appears to be not only desirable, because hand-coding these methods is mechanical and yet error-prone, but also feasible, because the form of the code is simple and largely predictable. Some languages and some object models presented in the literature do support generic copying and comparing, typically defining separate "shallow" and "deep" versions of both operations. A close examination of these definitions reveals inadequacies. Ii the objects involved are simple, copying and comparing them is straightforward. However, there are at least three areas in which insufficient attention has been given to copying and comparing complex objects: (1) values are not distinguished from objects;(2) aggregation is not distinguished from association;and (3) the correct handling of linked structures other than trees is neglected. Solving the third problem requires a mechanism built into the language, such as exists in Eiffel. Building such a mechanism without modifying the language requires a language with sufficient reflexive facilities, such as Smalltalk. Even then, the task is difficult and the result is likely to be insecure. We show that fully automatic generation of copying and comparing operations is not feasible because compilers and other software tools have access only to the structure of the objects and not to their semantics. Nevertheless, it is possible to provide default methods that do most of the work correctly and can be fine-tuned with a small additional amount of hand-coding. We include an example that illustrates the application of our proposals to C++. It is based on
The unrelenting pace of change that confronts contemporary software developers compels them to make their applications more configurable, flexible, and adaptable. A way to meet such requirements is to use an Adaptive ...
详细信息
暂无评论