In object-oriented programs, access modifiers are used to control the accessibility of fields and methods from other objects. Choosing appropriate access modifiers is one of the key factors for easily maintainable programming. In this paper, we propose a novel analysis method named Accessibility Excessiveness (AE) for each field and method in Java program, which is discrepancy between the access modifier declaration and its real usage. We have developed an AE analyzer - ModiChecker which analyzes each field or method of the input Java programs, and reports the excessiveness. We have applied ModiChecker to various Java programs, including several OSS, and have found that this tool is very useful to detect fields and methods with the excessiv...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
Property Types are a kind of user-defined refinement type about variables and fields in a program. T...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
In object-oriented programs, access modifiers are used to control the accessibility of fields and me...
Abstract. Access modifiers like public and private let the programmer control the accessibility of c...
Java access modifiers regulate interactions among software components. In particular, class modifier...
Java access modifiers regulate interactions among software components. In particular, class modifier...
Information hiding is a positive consequence of properly defining component interfaces. Unfortunatel...
Abstract. Contemporary refactoring tools for JAVA aiding in the restructuring of programs have probl...
We have identified three patterns in the source code to identify over-exposed methods. We also propo...
We use attribute grammars to formally specify the semantics of the access modifiers in the Java lang...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
While the Java runtime is installed on billions of devices and servers worldwide, it remains a prima...
AbstractIn feature-oriented programming (FOP) a programmer decomposes a program in terms of features...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
Property Types are a kind of user-defined refinement type about variables and fields in a program. T...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
In object-oriented programs, access modifiers are used to control the accessibility of fields and me...
Abstract. Access modifiers like public and private let the programmer control the accessibility of c...
Java access modifiers regulate interactions among software components. In particular, class modifier...
Java access modifiers regulate interactions among software components. In particular, class modifier...
Information hiding is a positive consequence of properly defining component interfaces. Unfortunatel...
Abstract. Contemporary refactoring tools for JAVA aiding in the restructuring of programs have probl...
We have identified three patterns in the source code to identify over-exposed methods. We also propo...
We use attribute grammars to formally specify the semantics of the access modifiers in the Java lang...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
While the Java runtime is installed on billions of devices and servers worldwide, it remains a prima...
AbstractIn feature-oriented programming (FOP) a programmer decomposes a program in terms of features...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
Property Types are a kind of user-defined refinement type about variables and fields in a program. T...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...