Evan Martin (evan) wrote in evan_tech,
Evan Martin

tail calls and security models

(I do get work done, I swear; I was waiting for a compile.)

An interesting thread over at Lambda the Ultimate (aka, where all of my posts come from) about tail-call optimization's interaction with Java's security model: if you naively optimize a function off the stack because of a tail-call there's the potential you're losing the security information (what permission that code has) associated with the function as well. As always, links to some papers are included.

I especially like the comment that says "The answer is so simple and obvious I'm amazed it took so long to find." and links to a 24-page paper full of sentences like "Following Cligner's [1998] work on defining tail-optimized languages via space complexity classes, we first reformulate the λsec semantics as a CESK machine."

  • more on bug tracking; distributed editing

    A few separate posts, all in the same area. 1) Most (all?) the distributed bug tracking software I've glanced at stores bugs in a directory, one…

  • dvcs and offline

    I got a couple of comments on that previous post that betray a bit of a misunderstanding about how collaborative projects work in the presence of…

  • distributed bug tracking

    Distributed bug tracking is the natural extension of distributed version control. Aside from the normal benefits of distributed version control, like…

  • Post a new comment


    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.