{"title":"信息隐藏,Intel iAPX 432和Ada","authors":"N. Coulter","doi":"10.1145/503896.503925","DOIUrl":null,"url":null,"abstract":"Information hiding principles help ensure the integrity of computer software. Additionally, those guidelines make software easier to modify and maintain. Computer architectures and languages that incorporate information hiding principles will help enforce adherence to those rules. The Intel iAPX processor and the language system Ada are, in part, based on information hiding principles.","PeriodicalId":184493,"journal":{"name":"ACM-SE 20","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1982-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Information hiding, the Intel iAPX 432,and Ada\",\"authors\":\"N. Coulter\",\"doi\":\"10.1145/503896.503925\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information hiding principles help ensure the integrity of computer software. Additionally, those guidelines make software easier to modify and maintain. Computer architectures and languages that incorporate information hiding principles will help enforce adherence to those rules. The Intel iAPX processor and the language system Ada are, in part, based on information hiding principles.\",\"PeriodicalId\":184493,\"journal\":{\"name\":\"ACM-SE 20\",\"volume\":\"146 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1982-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM-SE 20\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/503896.503925\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 20","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/503896.503925","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information hiding principles help ensure the integrity of computer software. Additionally, those guidelines make software easier to modify and maintain. Computer architectures and languages that incorporate information hiding principles will help enforce adherence to those rules. The Intel iAPX processor and the language system Ada are, in part, based on information hiding principles.