{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:27Z","timestamp":1772164047331,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T00:00:00Z","timestamp":1350864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,22]]},"DOI":"10.1145\/2384577.2384589","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T08:07:05Z","timestamp":1350893225000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Ownership, filters and crossing handlers"],"prefix":"10.1145","author":[{"given":"Erwann","family":"Wernli","sequence":"first","affiliation":[{"name":"University of Bern, Bern, Switzerland"}]},{"given":"Pascal","family":"Maerki","sequence":"additional","affiliation":[{"name":"University of Bern, Bern, Switzerland"}]},{"given":"Oscar","family":"Nierstrasz","sequence":"additional","affiliation":[{"name":"University of Bern, Bern, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2012,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646775.705734"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24851-4_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581365"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894386.1894393"},{"key":"e_1_3_2_1_5_1","volume-title":"Effective Java","author":"Bloch J.","year":"2008","unstructured":"J. Bloch . Effective Java ( 2 nd Edition) (The Java Series). Prentice Hall PTR , Upper Saddle River, NJ, USA, 2 edition, 2008 . ISBN 0321356683, 9780321356680. J. Bloch. Effective Java (2nd Edition) (The Java Series). Prentice Hall PTR, Upper Saddle River, NJ, USA, 2 edition, 2008. ISBN 0321356683, 9780321356680.","edition":"2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/640128.604156"},{"key":"e_1_3_2_1_7_1","first-page":"5","volume-title":"In FTfJP","author":"Boyland J.","year":"2005","unstructured":"J. Boyland . Why we should not add readonly to Java (yet . In In FTfJP , pages 5 -- 29 , 2005 . J. Boyland. Why we should not add readonly to Java (yet. In In FTfJP, pages 5--29, 2005."},{"key":"e_1_3_2_1_8_1","first-page":"2","volume-title":"Proceedings of the 15th European Conference on Object-Oriented Programming, ECOOP '01","author":"Boyland J.","year":"2001","unstructured":"J. Boyland , J. Noble , and W. Retert . Capabilities for sharing: A generalisation of uniqueness and read-only . In Proceedings of the 15th European Conference on Object-Oriented Programming, ECOOP '01 , pages 2 -- 27 , London, UK, UK , 2001 . Springer-Verlag. ISBN 3--540--42206--4. URL http:\/\/dl.acm.org\/citation.cfm?id=646158.680004. J. Boyland, J. Noble, and W. Retert. Capabilities for sharing: A generalisation of uniqueness and read-only. In Proceedings of the 15th European Conference on Object-Oriented Programming, ECOOP '01, pages 2--27, London, UK, UK, 2001. Springer-Verlag. ISBN 3--540--42206--4. URL http:\/\/dl.acm.org\/citation.cfm?id=646158.680004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035292.1029004"},{"key":"e_1_3_2_1_10_1","first-page":"405","volume-title":"ECOOP","author":"Bracha G.","year":"2010","unstructured":"Bykov, Kashai, Maddox, and Miranda}Brach10a G. Bracha , P. von der Ah\u00e9, V. Bykov, Y. Kashai, W. Maddox, and E. Miranda. Modules as objects in Newspeak . In ECOOP , pages 405 -- 428 , 2010 . Bykov, Kashai, Maddox, and Miranda}Brach10aG. Bracha, P. von der Ah\u00e9, V. Bykov, Y. Kashai, W. Maddox, and E. Miranda. Modules as objects in Newspeak. In ECOOP, pages 405--428, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869510"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/583854.582447"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89330-1_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/286942.286947"},{"key":"e_1_3_2_1_15_1","volume-title":"Vrije Universiteit Brussel","author":"Cutsem T. V.","year":"2012","unstructured":"T. V. Cutsem and M. S. Miller . On the design of the ECMAScript reflection api. Technical report , Vrije Universiteit Brussel , 2012 . T. V. Cutsem and M. S. Miller. On the design of the ECMAScript reflection api. Technical report, Vrije Universiteit Brussel, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542528"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297081.1297090"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/130943.130947"},{"key":"e_1_3_2_1_19_1","volume-title":"TOOLS Pacific 18","author":"Kent S.","year":"1995","unstructured":"S. Kent and I. Maung . Encapsulation and aggregation . In In TOOLS Pacific 18 . Prentice Hall , 1995 . S. Kent and I. Maung. Encapsulation and aggregation. In In TOOLS Pacific 18. Prentice Hall, 1995."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87873-5_17"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048147.2048175"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.35588"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_6"},{"key":"e_1_3_2_1_24_1","first-page":"224","volume-title":"LECTURE NOTES IN COMPUTER SCIENCE","author":"Miller M. S.","year":"2003","unstructured":"M. S. Miller and J. S. Shapiro . Paradigm Regained: Abstraction Mechanisms for Access Control . LECTURE NOTES IN COMPUTER SCIENCE , pages 224 -- 242 , 2003 . M. S. Miller and J. S. Shapiro. Paradigm Regained: Abstraction Mechanisms for Access Control. LECTURE NOTES IN COMPUTER SCIENCE, pages 224--242, 2003."},{"key":"e_1_3_2_1_25_1","first-page":"131","volume-title":"Programming Languages and Fundamentals of Programming","author":"M\u00fcller P.","year":"1999","unstructured":"er and Poetzsch-Heffter(1999)}Muel99a P. M\u00fcller and A. Poetzsch-Heffter . Universes: A type system for controlling representation exposure. In A. Poetzsch-Heffter and J. Meyer, editors , Programming Languages and Fundamentals of Programming , pages 131 -- 140 . Fernuniversitat Hagen , 1999 . Technical Report 263. er and Poetzsch-Heffter(1999)}Muel99aP. M\u00fcller and A. Poetzsch-Heffter. Universes: A type system for controlling representation exposure. In A. Poetzsch-Heffter and J. Meyer, editors, Programming Languages and Fundamentals of Programming, pages 131--140. Fernuniversitat Hagen, 1999. Technical Report 263."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297061"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/832260.833174"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/646155.679699"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/832259.833146"},{"key":"e_1_3_2_1_30_1","series-title":"phLecture Notes in Business Information Processing","first-page":"178","volume-title":"Wrigstad, Clarke, and \u00c5kerblom}Ostl08aJ. \u00d6stlund, T. Wrigstad, D. Clarke, and B. \u00c5kerblom. Ownership, uniqueness, and immutability","year":"2008","unstructured":"lund ( 2008 ) \u00d6stlund , Wrigstad, Clarke, and \u00c5kerblom}Ostl08aJ. \u00d6stlund, T. Wrigstad, D. Clarke, and B. \u00c5kerblom. Ownership, uniqueness, and immutability . In R. F. Paige and B. Meyer, editors, Objects, Components, Models and Patterns, 46th International Conference, TOOLS EUROPE 2008, volume 11 of phLecture Notes in Business Information Processing , pages 178 -- 197 . Springer , 2008. ISBN 978--3--540--69823--4. http:\/\/dx.doi.org\/10.1007\/978--3--540--69824--1_11. 10.1007\/978--3--540--69824--1_11 lund et al.(2008)\u00d6stlund, Wrigstad, Clarke, and \u00c5kerblom}Ostl08aJ. \u00d6stlund, T. Wrigstad, D. Clarke, and B. \u00c5kerblom. Ownership, uniqueness, and immutability. In R. F. Paige and B. Meyer, editors, Objects, Components, Models and Patterns, 46th International Conference, TOOLS EUROPE 2008, volume 11 of phLecture Notes in Business Information Processing, pages 178--197. Springer, 2008. ISBN 978--3--540--69823--4. http:\/\/dx.doi.org\/10.1007\/978--3--540--69824--1_11."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of Reflection'96","year":"1996","unstructured":"Rivard. Smalltalk : a reflective language . In Proceedings of Reflection'96 , 1996 . Rivard. Smalltalk: a reflective language. In Proceedings of Reflection'96, 1996."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035292.1028988"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28869-2_29"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048122"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899661.1869638"},{"key":"e_1_3_2_1_36_1","volume-title":"Intuitiveness of class and object encapsulation. In ph6th International Conference on Information Technology and Applications","author":"Voigt J.","year":"2009","unstructured":"J. Voigt , W. Irwin , and N. Churcher . Intuitiveness of class and object encapsulation. In ph6th International Conference on Information Technology and Applications , 2009 . J. Voigt, W. Irwin, and N. Churcher. Intuitiveness of class and object encapsulation. In ph6th International Conference on Information Technology and Applications, 2009."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_21"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287637"}],"event":{"name":"SPLASH '12: Conference on Systems, Programming, and Applications: Software for Humanity","location":"Tucson Arizona USA","acronym":"SPLASH '12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 8th symposium on Dynamic languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384577.2384589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2384577.2384589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:00:51Z","timestamp":1750262451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384577.2384589"}},"subtitle":["flexible ownership in dynamic languages"],"short-title":[],"issued":{"date-parts":[[2012,10,22]]},"references-count":38,"alternative-id":["10.1145\/2384577.2384589","10.1145\/2384577"],"URL":"https:\/\/doi.org\/10.1145\/2384577.2384589","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2480360.2384589","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,10,22]]},"assertion":[{"value":"2012-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}