WoTUG - The place for concurrent processes

Paper Details

@InProceedings{EllisBarnes12,
  title = "{D}ata {E}scape {A}nalysis for {P}rocess {O}riented {S}ystems",
  author= "Ellis, Martin and Barnes, Frederick R. M.",
  editor= "Welch, Peter H. and Barnes, Frederick R. M. and Chalmers, Kevin and Pedersen, Jan B√¶kgaard and Sampson, Adam T.",
  pages = "217--218",
  booktitle= "{C}ommunicating {P}rocess {A}rchitectures 2012",
  isbn= "978-0-9565409-5-9",
  year= "2012",
  month= "aug",
  abstract= "Escape analysis, the technique of discovering the boundaries
     of dynamically allocated objects, is a well explored
     technique for object-orientated languages (such as Java and
     C++) and stems from the functional programming community. It
     provides an insight into which objects interact directly
     (and indirectly) and can inform program correctness
     checking, or be used for directing optimisations
     (e.g. determining which objects can safely be allocated on a
     function-local stack). For process-oriented languages such
     as occam-pi and Google's Go, we have explored mobile escape
     analysis, that provides concise information about the
     movement of objects (mobiles) within networks
     of communicating processes. Because of the distinction
     between processes (as execution contexts) and objects
     (dynamically allocated data, channels and processes),
     combined with strict typing and aliasing rules, the analysis
     is somewhat simpler then for less strict languages.
     This analysis is only concerned with dynamically allocated
     blocks of memory -- it does not give any consideration for
     the data contained within these. However, knowing the extent
     to which data (statically or dynamically allocated) escapes
     within a network of communicating processes is arguably
     useful -- and is not necessarily a superset of mobile
     escape. The fringe presentation describes an extension to
     the mobile escape model that seeks to capture semantic
     information about the data escape of a process-oriented
     system. This provides richer semantic information about a
     process's behaviour (that can be used in verification) and
     has clear application to security (e.g. by demonstrating
     that particular data does not escape a set of communicating
     processes)."
}

If you have any comments on this database, including inaccuracies, requests to remove or add information, or suggestions for improvement, the WoTUG web team are happy to hear of them. We will do our best to resolve problems to everyone's satisfaction.

Copyright for the papers presented in this database normally resides with the authors; please contact them directly for more information. Addresses are normally presented in the full paper.

Pages © WoTUG, or the indicated author. All Rights Reserved.
Comments on these web pages should be addressed to: www at wotug.org

Valid HTML 4.01!