skip to main content
10.5555/766794.766802guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Formal methods in practice: the missing links. a perspective from the security area

Published: 01 January 2001 Publication History

Abstract

Our goal in this paper is not to enrich the literature with yet another defence of formal methods, but rather to build on our experience of using and studying formal methods in security to provide an industrial point of view, with a strong emphasis on practicality. We also hope that, even if we take our inspiration mainly in the security area, most of our observations on formal methods are relevant to other application domains as well. The term "security" itself can be used in various contexts with different meanings. We use it here in the sense of security of information, as defined by the standard triptych: confidentiality, integrity and availability.

References

[1]
1. Abrial, J. R.: "Assigning programs to meaning". Cambridge University Press 1996.
[2]
2. Bochmann, G., Petrenko, A.: "Protocol testing: review of methods and relevance for software testing". Proc. of the ACM int. Symposium on software testing and analysis 1994.
[3]
3. Booch,G., Rumbaugh, J., Jacobson, I.: "The Unified Modeling Language user guide". Addison-Wesley 1998.
[4]
4. Bowman, H., Boiten, E., Derrick, J., Steen, M.: "Viewpoint consistency in ODP, a general interpretation". Proc. of the 1st IFIP int. Workshop on formal methods for open object-based distributed systems, Chapman & Hall 1996, pp. 189-204.
[5]
5. "The Common Criteria for Information Technology Security Evaluation". http://www.commoneriteria, org/docs /aboutus.html.
[6]
6. De Millo, R. A, Lipton, R. J., Perlis, A. J.: "Social processes and proofs of theorems and programs". Communications of the ACM, 22(5) 1979, pp. 271-280.
[7]
7. Fernandez, J-C., Jard, C., Jéron, T., Viho, C.: "An experiment in automatic generation of test suites for protocols with verification technology". Science of Computer Programming, Vol. 28, 1997, pp. 123-146.
[8]
8. Fradet, P., Le Métayer, D., Périn, M.: "Consistency checking for multiple view software architecture". Proc. 7th ACM SIGSOFT Symposium on the Foundations of Software Engineering, Springer Verlag, LNCS 1687, 1999, pp. -410-428.
[9]
9. Kruchten, P-B.: "The 4+1 view model of architecture". IEEE Software, 12(6), 1995, pp. 42-50.
[10]
10. "The Precise UML (PUML) group", http://www.cs.york.ac.uk/puml/.
[11]
11. Spivey, J.: "The Z reference manual". Prentice Hall, 1992.
[12]
12. Van Aertryck, L., Benveniste, M., Le Métayer, D.: "Casting: a formally based software test generation method". IEEE int. Conference on formal engineering methods, 1997, pp. 101-111.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide books
Modeling and verification of parallel processes
January 2001
223 pages
ISBN:3540427872
  • Editors:
  • Franck Cassez,
  • Claude Jard,
  • Brigitte Rozoy,
  • Mark Dermot Ryan

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 2001

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media