Abstract
Formal methods are often discussed as if they are concerned with purely technical actions and decisions, guided by mathematical principles. On the contrary, analysis of industrial case studies shows that the adoption and use of such methods involves many social and organisational factors which should receive at least as much study as the technical factors. Failure to give these adequate attention may be one of the causes of the slow acceptance of formal methods in industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Appelt, W., Carr, R., Richter, G., “The formal specification of the document structures of the ODA standard” in J.C. van Vliet (editor), Document Manipulation and Typography, Cambridge University Press, 1988.
Arnold, D.B., Duce, D.A., Reynolds, G.J., “An approach to the formal specification of configurable models of graphics systems,” in G. Maréchal (ed.), Proc. Eurographics 87, North Holland 1987.
Duce, D.A., “Formal specification of Graphics Software,” (Technical report, RAL).
ISO 8613, Office Document Architecture (ODA) and Interchange Format, International Standard IS 8613, International Organization for Standardization, 1988.
Ruggles, C.L.N. (editor), Formal Methods in Standards (A report from the BCS Working Group), Springer-Verlag, 1990.
Anderson, T. (ed) Safe and secure computing systems, Oxford: Basil Blackwell, 1989.
Bowen, J., Stavidrou, V., “Safety-critical systems, formal methods and standards”, Draft paper submitted for publication, PRG Oxford, 1992.
Clarke, S., Coombes, A., McDermid, J.A., “The analysis of safety arguments in the specification of a motor speed control loop,” Technical Report YCS 136 (1990) University of York.
Levenson, N. G., “Software safety: why, what and how,” ACM Computing Surveys, Vol 18 No 2 (June 1986) 125–163.
Levenson, N. G., “Software safety in embedded computer system,” Comm. ACM, Vol 34 No 2 (February 1991) 36–46.
McDermid, J.A., “Formal methods: use and relevance for the development of safety critical system,” Technical report, University of York.
Ministry of Defence, The Procurement of Safety Critical Software in Defence Equipment, Defence Standard 00-55 (April 1991).
Neumann, P.G., “RISKS to the public in computers and related systems,” (Cumulative index) ACM Software Engineering Notes, January 1989.
Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.
D. E. Bell and L. J. La Padula, “Secure computer system: unified exposition and MULTICS,” MITRE Corporation, Technical report ESD-TR-75-306, 1976.
Computer-Electronics Security Group, Design Methodology Requirements, U.K. Government Communications Headquarters, CESG Computer Security Memorandum No. 9, 1991.
Computer-Electronics Security Group, A Formal Development Methodology for High Confidence Systems, U.K. Government Communications Headquarters, CESG Computer Security Memorandum F, 1991.
DoD, “Department of Defense Trusted Computer System Evaluation Criteria,” Technical Report CSC-STD-001-83 dated 15 August 1983, DoD Computer Security Center, Fort George G. Meade, Maryland 20755. (Known as the “Orange Book”).
J. A. Goguen, J. Meseguer, “Security Policies and Security Models,” Proceedings 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1982, 11–20.
J. McLean, “Security Models and Information Flow,” Proceedings 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990 180–187.
P. G. Neumann, “On the Design of Dependable Computer Systems for Critical Applications” SRI International Computer Science Laboratory, 1990, SRI-CSL-90-10.
J. M. Rushby, “The Design and Verification of Secure Systems,” in Proceedings 8th ACM Symposium on Operating System Principles, 1981 (available as ACM Operating Systems Review 15 5).
Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.
Wilkes, M.V., “Revisiting computer security in the business world,” Comm ACM 34, 8 (Aug 1991) 19–21.
Alexander, H., Formally-based tools and techniques for human-computer dialogues, Ellis Horwood, 1987.
Anderson, S.O., “Proving properties of interactive systems,” in Harrison and Monk (editors) People and computers: Designing for usability, Cambridge, 1986.
Coutaz, J., “Abstractions for user interface design,” IEEE Computer, Vol 18 no 9 (1985) 31–34.
Dix, A.J., Harrison, M.D., Runciman, C., Thimbleby, H.W., “Interaction models and” the principled design of interactive systems, in European Software Engineering Conference, Springer Lecture Notes, 1987 127–135.
Farooq, M.U., Dominick, W.D., “A survey of formal tools and models for developing user interfaces,” Int. J. Man-Machine Studies, vol 29 (1988) 479–496.
Foley, J.D., van Dam, A., Feiner, S.K., Hughes, J.F., Computer graphics: Principles and Practice, Addison-Wesley, 1990.
Harrison, M, Thimbleby, H. (editors), Formal Methods in Human-Computer Interaction, Cambridge University Press, 1990.
Harrison, M., “Engineering human-error tolerant software,” in Proceedings 6th 2 User Meeting, Springer Verlag, 1992 (this volume).
Jacob, R.J.K., “Using formal specifications in the design of a human-computer interface,” Comm. ACM, Vol 26 No 4 (1983), 259–264.
Reisner, P., “Formal grammar as a tool for analyzing ease of use: some fundamental concepts,” in J.C. Thomas, M.L. Schneider (editors), Human factors in computer systems, Ablex, 1983.
Took, R., “Putting design into practice: Formal specification and the user interface,” in Harrison, M., Thimbleby, H. (editors), Formal methods in human-computer interaction, Cambridge University Press, 1990.
Ziegler, J., Bullinger, H.-J., “Formal models and techniques in human-computer interaction,” in Shackel, B., Richardson, S.J.(editors), Human factors for informatics usability, Cambridge 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 British Computer Society
About this paper
Cite this paper
Nicholls, J.E. (1992). Domains of application for formal methods. In: Nicholls, J.E. (eds) Z User Workshop, York 1991. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3203-5_7
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3203-5_7
Publisher Name: Springer, London
Print ISBN: 978-3-540-19780-5
Online ISBN: 978-1-4471-3203-5
eBook Packages: Springer Book Archive