Skip to main content

Domains of application for formal methods

  • Conference paper
Z User Workshop, York 1991

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

Formal methods are often discussed as if they are concerned with purely technical actions and decisions, guided by mathematical principles. On the contrary, analysis of industrial case studies shows that the adoption and use of such methods involves many social and organisational factors which should receive at least as much study as the technical factors. Failure to give these adequate attention may be one of the causes of the slow acceptance of formal methods in industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Appelt, W., Carr, R., Richter, G., “The formal specification of the document structures of the ODA standard” in J.C. van Vliet (editor), Document Manipulation and Typography, Cambridge University Press, 1988.

    Google Scholar 

  • Arnold, D.B., Duce, D.A., Reynolds, G.J., “An approach to the formal specification of configurable models of graphics systems,” in G. Maréchal (ed.), Proc. Eurographics 87, North Holland 1987.

    Google Scholar 

  • Duce, D.A., “Formal specification of Graphics Software,” (Technical report, RAL).

    Google Scholar 

  • ISO 8613, Office Document Architecture (ODA) and Interchange Format, International Standard IS 8613, International Organization for Standardization, 1988.

    Google Scholar 

  • Ruggles, C.L.N. (editor), Formal Methods in Standards (A report from the BCS Working Group), Springer-Verlag, 1990.

    Google Scholar 

  • Anderson, T. (ed) Safe and secure computing systems, Oxford: Basil Blackwell, 1989.

    Google Scholar 

  • Bowen, J., Stavidrou, V., “Safety-critical systems, formal methods and standards”, Draft paper submitted for publication, PRG Oxford, 1992.

    Google Scholar 

  • Clarke, S., Coombes, A., McDermid, J.A., “The analysis of safety arguments in the specification of a motor speed control loop,” Technical Report YCS 136 (1990) University of York.

    Google Scholar 

  • Levenson, N. G., “Software safety: why, what and how,” ACM Computing Surveys, Vol 18 No 2 (June 1986) 125–163.

    Google Scholar 

  • Levenson, N. G., “Software safety in embedded computer system,” Comm. ACM, Vol 34 No 2 (February 1991) 36–46.

    Google Scholar 

  • McDermid, J.A., “Formal methods: use and relevance for the development of safety critical system,” Technical report, University of York.

    Google Scholar 

  • Ministry of Defence, The Procurement of Safety Critical Software in Defence Equipment, Defence Standard 00-55 (April 1991).

    Google Scholar 

  • Neumann, P.G., “RISKS to the public in computers and related systems,” (Cumulative index) ACM Software Engineering Notes, January 1989.

    Google Scholar 

  • Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.

    MATH  Google Scholar 

  • D. E. Bell and L. J. La Padula, “Secure computer system: unified exposition and MULTICS,” MITRE Corporation, Technical report ESD-TR-75-306, 1976.

    Google Scholar 

  • Computer-Electronics Security Group, Design Methodology Requirements, U.K. Government Communications Headquarters, CESG Computer Security Memorandum No. 9, 1991.

    Google Scholar 

  • Computer-Electronics Security Group, A Formal Development Methodology for High Confidence Systems, U.K. Government Communications Headquarters, CESG Computer Security Memorandum F, 1991.

    Google Scholar 

  • DoD, “Department of Defense Trusted Computer System Evaluation Criteria,” Technical Report CSC-STD-001-83 dated 15 August 1983, DoD Computer Security Center, Fort George G. Meade, Maryland 20755. (Known as the “Orange Book”).

    Google Scholar 

  • J. A. Goguen, J. Meseguer, “Security Policies and Security Models,” Proceedings 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1982, 11–20.

    Google Scholar 

  • J. McLean, “Security Models and Information Flow,” Proceedings 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990 180–187.

    Google Scholar 

  • P. G. Neumann, “On the Design of Dependable Computer Systems for Critical Applications” SRI International Computer Science Laboratory, 1990, SRI-CSL-90-10.

    Google Scholar 

  • J. M. Rushby, “The Design and Verification of Secure Systems,” in Proceedings 8th ACM Symposium on Operating System Principles, 1981 (available as ACM Operating Systems Review 15 5).

    Google Scholar 

  • Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.

    MATH  Google Scholar 

  • Wilkes, M.V., “Revisiting computer security in the business world,” Comm ACM 34, 8 (Aug 1991) 19–21.

    Google Scholar 

  • Alexander, H., Formally-based tools and techniques for human-computer dialogues, Ellis Horwood, 1987.

    Google Scholar 

  • Anderson, S.O., “Proving properties of interactive systems,” in Harrison and Monk (editors) People and computers: Designing for usability, Cambridge, 1986.

    Google Scholar 

  • Coutaz, J., “Abstractions for user interface design,” IEEE Computer, Vol 18 no 9 (1985) 31–34.

    Article  Google Scholar 

  • Dix, A.J., Harrison, M.D., Runciman, C., Thimbleby, H.W., “Interaction models and” the principled design of interactive systems, in European Software Engineering Conference, Springer Lecture Notes, 1987 127–135.

    Google Scholar 

  • Farooq, M.U., Dominick, W.D., “A survey of formal tools and models for developing user interfaces,” Int. J. Man-Machine Studies, vol 29 (1988) 479–496.

    Article  Google Scholar 

  • Foley, J.D., van Dam, A., Feiner, S.K., Hughes, J.F., Computer graphics: Principles and Practice, Addison-Wesley, 1990.

    Google Scholar 

  • Harrison, M, Thimbleby, H. (editors), Formal Methods in Human-Computer Interaction, Cambridge University Press, 1990.

    Google Scholar 

  • Harrison, M., “Engineering human-error tolerant software,” in Proceedings 6th 2 User Meeting, Springer Verlag, 1992 (this volume).

    Google Scholar 

  • Jacob, R.J.K., “Using formal specifications in the design of a human-computer interface,” Comm. ACM, Vol 26 No 4 (1983), 259–264.

    Article  Google Scholar 

  • Reisner, P., “Formal grammar as a tool for analyzing ease of use: some fundamental concepts,” in J.C. Thomas, M.L. Schneider (editors), Human factors in computer systems, Ablex, 1983.

    Google Scholar 

  • Took, R., “Putting design into practice: Formal specification and the user interface,” in Harrison, M., Thimbleby, H. (editors), Formal methods in human-computer interaction, Cambridge University Press, 1990.

    Google Scholar 

  • Ziegler, J., Bullinger, H.-J., “Formal models and techniques in human-computer interaction,” in Shackel, B., Richardson, S.J.(editors), Human factors for informatics usability, Cambridge 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 British Computer Society

About this paper

Cite this paper

Nicholls, J.E. (1992). Domains of application for formal methods. In: Nicholls, J.E. (eds) Z User Workshop, York 1991. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3203-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3203-5_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19780-5

  • Online ISBN: 978-1-4471-3203-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics