From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,29d8139471e3f53e X-Google-NewGroupId: yes X-Google-Attributes: gida07f3367d7,domainid0,public,usenet X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!news1.google.com!npeer03.iad.highwinds-media.com!news.highwinds-media.com!feed-me.highwinds-media.com!nntp.club.cc.cmu.edu!feeder.erje.net!newsfeed.straub-nv.de!noris.net!newsfeed.arcor.de!newsspool3.arcor-online.net!news.arcor.de.POSTED!not-for-mail Date: Mon, 13 Sep 2010 17:12:04 +0200 From: Georg Bauhaus User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.9) Gecko/20100825 Thunderbird/3.1.3 MIME-Version: 1.0 Newsgroups: comp.lang.ada Subject: Re: Securing type extensions (was: Preventing type extensions) References: <87iq2bfenl.fsf@mid.deneb.enyo.de> <874odv9npv.fsf@ludovic-brenta.org> <87y6b7cedd.fsf@mid.deneb.enyo.de> <66a3704c-54f9-4f04-8860-aa12f516134b@t3g2000vbb.googlegroups.com> <87d3sib44t.fsf@mid.deneb.enyo.de> <134q4k2ly2pf4$.17nlv1q6q5ivo.dlg@40tude.net> <4c8dec8e$0$6990$9b4e6d93@newsspool4.arcor-online.net> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Message-ID: <4c8e3f44$0$6769$9b4e6d93@newsspool3.arcor-online.net> Organization: Arcor NNTP-Posting-Date: 13 Sep 2010 17:12:04 CEST NNTP-Posting-Host: b0c4c0de.newsspool3.arcor-online.net X-Trace: DXC=\HGTA2oiW[0_A0jCfgHO6>McF=Q^Z^V384Fo<]lROoR18kF:Lh>_cHTX3j=\b2a\^Ob7@= X-Complaints-To: usenet-abuse@arcor.de Xref: g2news1.google.com comp.lang.ada:14043 Date: 2010-09-13T17:12:04+02:00 List-Id: On 13.09.10 11:42, Dmitry A. Kazakov wrote: >> If a system must reflect trust and mistrust, shouldn't the >> mechanics of a language support both? > > In Ada it is called visibility. An event driven parser (or GUI) as an example: the gears of the parser (or event loop) interact with the prim ops of a user defined type. The type will have been derived from some abstract type that I provided. How will Ada's visibility rules help me trust the ops? Georg