Proceedings of 16th Workshop on Formal Techniques for Java-Like Programs 2014
DOI: 10.1145/2635631.2635847
|View full text |Cite
|
Sign up to set email alerts
|

Constraint Semantics for Abstract Read Permissions

Abstract: The concept of controlling access to mutable shared data via permissions is at the heart of permission logics such as separation logic and implicit dynamic frames, and is also used in type systems, for instance, to give a semantics to "readonly" annotations. Existing permission models have different strengths in terms of expressiveness. Fractional permissions, for example, enable unbounded (recursive) splitting, whereas counting permissions enable unbounded subtraction of the same permission amount. Combining … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In this example four different threads manipulate two shared buffers to process and "draw" some input data passing the permissions to these buffers in a non-trivial way. Few other examples are available in the KeY distribution, in particular fully specified and verified readwrite lock example from [24] we mentioned above, and the examples from this and earlier paper on symbolic permissions are available on-line [22].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this example four different threads manipulate two shared buffers to process and "draw" some input data passing the permissions to these buffers in a non-trivial way. Few other examples are available in the KeY distribution, in particular fully specified and verified readwrite lock example from [24] we mentioned above, and the examples from this and earlier paper on symbolic permissions are available on-line [22].…”
Section: Discussionmentioning
confidence: 99%
“…Our client code (ls. [24][25] specifies that in the locked state it holds a complete write permission to val, while in the unlocked state it holds no permission at all. Note that in this case these two are not the binary opposites of each other, hence the need for the locked parameter in status.…”
Section: Modular Specifications For Synchronisersmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, inference of fractional and quantified permissions has been investigated by Peter Müller and his colleagues [22,20] to verify classbased concurrent programs based on the abstract interpretations [18]. Similarly, permission-based specifications have been used in many formal approaches to address issues related to safe concurrency, security and verification of functional and domain specific properties [35,31,15,47,29,41,17,30,26,37,28].…”
Section: Introductionmentioning
confidence: 99%