Abstract
This paper describes methods for decomposing large conjectures into smaller ones in order to make their proof easier and for limiting the amount of reproving that occurs when a specification is modified. It proposes a tool, based on these methods, for managing the proofs of conjectures about an evolving specification.
- {DOD81} "Requirements for the Ada Programming Support Environment: STONEMAN," Technical Report, U.S. Department of Defense (1981).]]Google Scholar
- {ADA83} "Ada Language Reference Manual," MIL-STD-1815A, U.S. Department of Defense (1983).]]Google Scholar
- {Bry82} Berry, D. M., "The Application of the Formal Development Methodology to Data Base Design and Integrity Verification," Proceedings of Fourth Israel Conference on Software Quality Assurance (1982).]]Google Scholar
- {Fel78} Feldman, S. I., "Make --- A Program for Maintaining Computer Programs," Technical Report, Bell Laboratories, Murray Hill, NJ (1978).]]Google Scholar
- {Ger78} Gerhart, S. L., "Program Verification in the 1980s: Problems, Perspectives, and Opportunities," ISI/RR-78-71, USC Information Sciences Institute, Marina Del Rey, CA (August, 1978).]]Google Scholar
- {Kem79} Kemmerer, R. A., "Formal Verification of the UCLA Security Kernel: Abstract Model, Mapping Functions, Theorem Generation, and Proofs," Ph.D. Dissertation, Computer Science Department, UCLA (1979).]] Google ScholarDigital Library
- {LSSE80} Locasso, R., Scheid, J., Schorre, D. V., and Eggert, P. R., "The Ina Jo Reference Manual," TM-(L)-6021/001/000, System Development Corporation, Santa Monica, CA (June 27, 1980).]]Google Scholar
- {Mil7?} Millen, J. K., "Validation of the PDP-11/45 Security Kernel: Upper Level Specification," Technical Report, Mitre Corp., New Bedford, MA(197?).]]Google Scholar
- {DLP79} Millo, R. A. De, Lipton, R. J., and Perlis, A., "Social Processes and Proofs of Theorems and Programs," Communications of the ACM22(5), pp. 271--280 (1979).]] Google ScholarDigital Library
- {Mor79} Moriconi, M. S., "A Designer/Verifier's Assistant," IEEE Transactions on Software EngineeringSE-5(4), pp. 387--401 (July, 1979).]]Google Scholar
- {Mye75} Myers, G. J., Reliable Software through Composite Design, Petrocelli/Charter, New York, NY (1975).]] Google ScholarDigital Library
- {Par72} Parnas, D. L., "On the Criteria to be Used in Decomposing Systems into Modules," Communications of the ACM15(2), pp. 1053--1058 (December, 1972).]] Google ScholarDigital Library
- {SS84} Schorre, D. V. and Stein, J., "The Interactive Theorem Prover (ITP) User Manual," Tech. Report TM-6889/006/01, System Development Corporation, Santa Monica, CA (1984).]]Google Scholar
- {PC80} Smallberg, D. A. and London, R, "Private Communication," USC ISI (1980).]]Google Scholar
- {Tic81} Tichy, W., Revision Control System, Purdue University, Lafayette, IN (1981).]]Google Scholar
Recommendations
Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language
Special issue on computer security and privacyIn carrying out SDC's Formal Development Method, one writes a specification of a system under design in the Ina Jo™ specification language and proves that the specification meets the requirements of the system. This paper develops an abstract machine ...
A Formal Framework for ASTRAL Intralevel Proof Obligations
ASTRAL is a formal specification language for real-time systems. It is intended to support formal software development, and therefore has been formally defined. This paper focuses on how to formally prove the mathematical correctness of ASTRAL ...
Extending Ina Jo with Temporal Logic
The authors give both informal and formal descriptions of both the current Ina Jo specification language and Ina Jo enhanced with temporal logic. They include details of a simple example to demonstrate the use of the proof system and details of an ...
Comments