Proxies are the swiss army knifes of object adaptation. They introduce a level of indirection to intercept select operations on a target object and divert them as method calls to a handler. Proxies are often used as wrappers to implement access control via membranes or to enforce adherence to a contract.
One important question in the design of a proxy API is whether a proxy object has its own identity. For some applications, in particular those related to security, this choice is advantageous whereas other applications, in particular contract systems, require transparency, that is, proxies that compare equal to their target objects.
Wed 8 JulDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
15:30 - 17:00
ObjectsResearch Track at Bohemia
Chair(s): Kim Bruce Pomona College
|A Theory of Tagged Objects|
Joseph Lee Carnegie Mellon University, Jonathan Aldrich Carnegie Mellon University, Troy Shaw Victoria University of Wellington, Alex Potanin Victoria University of Wellington
|Brand Objects for Nominal Typing|
Timothy Jones Victoria University of Wellington, Michael Homer Victoria University of Wellington, James Noble Victoria University of Wellington
Matthias Keil University of Freiburg, Peter Thiemann University of Freiburg