[1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science
DOI: 10.1109/lics.1992.185530
|View full text |Cite
|
Sign up to set email alerts
|

The type and effect discipline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
130
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 114 publications
(130 citation statements)
references
References 12 publications
0
130
0
Order By: Relevance
“…If we considered only benchmarks proposed in the literature [10,11], we would come to the conclusion that the relaxed value restriction adds no power: its results exactly matches those of the strict value restriction. This is because all examples in the literature are only concerned with polymorphic procedures, not polymorphic data.…”
Section: Typing Power and Usefulnessmentioning
confidence: 96%
See 1 more Smart Citation
“…If we considered only benchmarks proposed in the literature [10,11], we would come to the conclusion that the relaxed value restriction adds no power: its results exactly matches those of the strict value restriction. This is because all examples in the literature are only concerned with polymorphic procedures, not polymorphic data.…”
Section: Typing Power and Usefulnessmentioning
confidence: 96%
“…As such, this would be sound to make them normal polymorphic variables. Yet more refined type systems, based either on effect analysis by Talpin and Jouvelot [10] or closure typing by Leroy and Weis [11,12], are able to extract this polymorphism, by tracking in more detail creation and access of references. They both give the same type to imp map and an applicative version of map, but this is at the price of adding information about the program execution flow.…”
Section: Conservative Solutionsmentioning
confidence: 99%
“…We have introduced a type and effect system for our calculus [21,28,35]. The type of a service describes its functional behaviour, while the effect is a history expression, representing those histories of events relevant to security.…”
Section: A Static Approach To Secure Service Compositionmentioning
confidence: 99%
“…We cannot aim for completeness here, for a good overview see the recent survey paper by Palsberg in the PASTE'01 workshop. Particularly influencing are the works on region calculus [20], on effect systems [17,13,14], on flow analysis [19], on secrecy and security analysis [8,16,22,21], on binding-time analysis [3,9,12,5,6].…”
Section: Related Workmentioning
confidence: 99%