Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks, Secure Internet Programming, pp.35-49, 1999. ,
DOI : 10.1007/3-540-48749-2_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5984
Mirrors: Design principles for metalevel facilities of object-oriented programming languages, Proceedings of OOPSLA'04, pp.331-344, 2004. ,
Generic Wrappers, Proceedings of ECOOP'00, pp.201-225, 2000. ,
DOI : 10.1007/3-540-45102-1_10
Reflections on MOP s, Components, and Java Security, Proceedings of ECOOP'01, pp.256-274, 2001. ,
DOI : 10.1007/3-540-45337-7_14
A simple security???Aware MOP for Java, Proceedings of the International Conference on Metalevel Architectures and Separation of Crosscutting Concerns (REFLECTION), pp.118-125, 2001. ,
DOI : 10.1007/3-540-45429-2_9
Ownership types for flexible alias protection, Proceedings of OOPSLA'98, pp.48-64, 1998. ,
DOI : 10.1145/286942.286947
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.2115
Simple Ownership Types for Object Containment, Proceedings of ECOOP'01, pp.53-76, 2001. ,
DOI : 10.1007/3-540-45337-7_4
Ownership Types: A Survey, Aliasing in Object-Oriented Programming. Types, Analysis and Verification, pp.15-58, 2013. ,
DOI : 10.1007/978-3-642-36946-9_3
Flexible object encapsulation for ambient-oriented programming, Proceedings of the 2005 conference on Dynamic languages symposium , DLS '05, pp.11-21, 2005. ,
DOI : 10.1145/1146841.1146843
Uniform proxies for Java, Proceedings of OOPSLA'06, pp.139-152, 2006. ,
Computational reflection in class-based object-oriented languages, Proceedings of OOPSLA'89, pp.317-326, 1989. ,
Dynamic ownership in a dynamic language, Proceedings of the 2007 symposium on Dynamic languages , DLS '07, pp.41-52, 2007. ,
DOI : 10.1145/1297081.1297090
The Art of the Metaobject Protocol, 1991. ,
Concepts and experiments in computational reflection, Proceedings of OOPSLA'87, pp.147-155, 1987. ,
Joe-E: A security-oriented subset of java, Proceedings of the Symposium on Network and Distributed System Security (NDSS), pp.357-374, 2010. ,
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, 2006. ,
Paradigm Regained: Abstraction Mechanisms for Access Control, Advances in Computing Science?ASIAN 2003. Progamming Languages and Distributed Computation, pp.224-242, 2003. ,
DOI : 10.1007/978-3-540-40965-6_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.7297
Mirror-based reflection in ambienttalk . Software: Practice and Experience, pp.661-699, 2009. ,
Flexible alias protection, Proceedings of ECOOP'98, pp.158-185, 1998. ,
DOI : 10.1007/BFb0054091
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.4971
Object ownership for dynamic alias protection, Proceedings Technology of Object-Oriented Languages and Systems. TOOLS 32, pp.176-187, 1999. ,
DOI : 10.1109/TOOLS.1999.809424
Encapsulators: A new software paradigm in smalltalk- 80, Proceedings of OOPSLA'86, pp.341-346, 1986. ,
Ghost: A uniform and general-purpose proxy implementation, Science of Computer Programming, vol.98, pp.339-359, 2015. ,
DOI : 10.1016/j.scico.2014.05.015
URL : https://hal.archives-ouvertes.fr/hal-00877757
Meta objects for access control, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.17-22, 1997. ,
DOI : 10.1145/283699.283735
Meta objects for access control: Role-based principals, Proceedings of the Australasian Conference on Information Security and Privacy (ACISP), pp.296-307, 1998. ,
DOI : 10.1007/BFb0053742
Reflection and semantics in LISP, Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '84, pp.23-35, 1984. ,
DOI : 10.1145/800017.800513
Proxies: Design principles for robust object-oriented intercession APIs, Proceedings of DLS'10, pp.59-72, 2010. ,
Trustworthy Proxies, Proceedings of ECOOP'13, pp.154-178, 2013. ,
DOI : 10.1007/978-3-642-39038-8_7