首页 > 最新文献

COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance最新文献

英文 中文
A case study in process representation using MVP-L 一个使用MVP-L进行过程表示的案例研究
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235756
C. Klingler, M. Nevaiser, A. Marmor-Squires, C. Lott, H. D. Rombach
The authors conducted a case study within TRW which involved the creation of formal process specifications and designs using MVP-L, an existing process notation. The goals of the overall study were aimed at understanding the various steps in representing processes and evaluating notations for each process-representation step. These goals were consistent with the vision of a process-driven, reuse-based, technology-supported paradigm for the development of software-intensive systems. The study, the lessons learned about process representation in general, and the lessons learned about the language MVP-L are described in detail.<>
作者在TRW内部进行了一个案例研究,其中涉及使用MVP-L(一种现有的过程符号)创建正式的过程规范和设计。整个研究的目标是理解表示过程的各个步骤,并评估每个过程表示步骤的符号。这些目标与开发软件密集型系统的过程驱动的、基于重用的、技术支持的范例的远景一致。详细描述了该研究、关于过程表示的一般经验教训以及关于MVP-L语言的经验教训。
{"title":"A case study in process representation using MVP-L","authors":"C. Klingler, M. Nevaiser, A. Marmor-Squires, C. Lott, H. D. Rombach","doi":"10.1109/CMPASS.1992.235756","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235756","url":null,"abstract":"The authors conducted a case study within TRW which involved the creation of formal process specifications and designs using MVP-L, an existing process notation. The goals of the overall study were aimed at understanding the various steps in representing processes and evaluating notations for each process-representation step. These goals were consistent with the vision of a process-driven, reuse-based, technology-supported paradigm for the development of software-intensive systems. The study, the lessons learned about process representation in general, and the lessons learned about the language MVP-L are described in detail.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123702457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Efficient response time bound analysis of real-time rule-based systems 基于规则的实时系统的有效响应时限分析
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235761
A. Cheng, C.-H. Chen
It is required not only to verify the logical correctness of a real-time expert system but also to determine whether the computation time required to compute a logically correct decision in each monitor-decide cycle is within the imposed timing constraint. A principal concept in the analysis methodology is that of a special form of rules. A set of rules satisfying all behavioral constraint assertions of a special form is guaranteed to have bounded response time. The authors present efficient algorithms for computing tight response time bounds for rule sets with bounded response time. These algorithms use techniques which do not involve checking the state-space graph corresponding to the rule sets.<>
不仅需要验证实时专家系统的逻辑正确性,而且需要确定在每个监测-决策周期中计算逻辑正确决策所需的计算时间是否在给定的时间约束内。分析方法中的一个主要概念是规则的一种特殊形式。满足特定形式的所有行为约束断言的一组规则保证具有有限的响应时间。作者提出了计算响应时间有界的规则集的严格响应时间边界的有效算法。这些算法使用的技术不涉及检查与规则集对应的状态空间图
{"title":"Efficient response time bound analysis of real-time rule-based systems","authors":"A. Cheng, C.-H. Chen","doi":"10.1109/CMPASS.1992.235761","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235761","url":null,"abstract":"It is required not only to verify the logical correctness of a real-time expert system but also to determine whether the computation time required to compute a logically correct decision in each monitor-decide cycle is within the imposed timing constraint. A principal concept in the analysis methodology is that of a special form of rules. A set of rules satisfying all behavioral constraint assertions of a special form is guaranteed to have bounded response time. The authors present efficient algorithms for computing tight response time bounds for rule sets with bounded response time. These algorithms use techniques which do not involve checking the state-space graph corresponding to the rule sets.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The use of Ada PDL as the basis for validating a system specified by control flow logic 使用Ada PDL作为验证由控制流逻辑指定的系统的基础
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235760
R. Mead
A specification for the control processes that constitute the Advanced Train Control System (ATCS) is considered. The process of validating the logic contained in those control processes is addressed. The evolution of the specifications describing the control processes in the ATCS has been from a high-level, operational view of railroad operations to a detailed logical description of a transaction-based event-response system. That process has required much functional decomposition and evaluation of design approaches. A description is given of a validation process that is feasible because the system logic exists in the compilable Ada PDL language used. In this approach, the specifications themselves become the engine for their own validation.<>
考虑了构成先进列车控制系统(ATCS)的控制过程的规范。验证这些控制过程中包含的逻辑的过程被处理。ATCS中描述控制过程的规范已经从铁路运营的高级操作视图演变为基于事务的事件响应系统的详细逻辑描述。这个过程需要对设计方法进行大量的功能分解和评估。由于系统逻辑存在于所使用的可编译Ada PDL语言中,因此给出了验证过程的可行性描述。在这种方法中,规范本身成为它们自己验证的引擎
{"title":"The use of Ada PDL as the basis for validating a system specified by control flow logic","authors":"R. Mead","doi":"10.1109/CMPASS.1992.235760","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235760","url":null,"abstract":"A specification for the control processes that constitute the Advanced Train Control System (ATCS) is considered. The process of validating the logic contained in those control processes is addressed. The evolution of the specifications describing the control processes in the ATCS has been from a high-level, operational view of railroad operations to a detailed logical description of a transaction-based event-response system. That process has required much functional decomposition and evaluation of design approaches. A description is given of a validation process that is feasible because the system logic exists in the compilable Ada PDL language used. In this approach, the specifications themselves become the engine for their own validation.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"944 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Z specifications in category partition testing 使用Z规范进行类别划分测试
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235766
N. Amla, P. Ammann
The application of specification-based test methods to informal functional specifications requires considerable analysis on the part of the test engineer. The authors hypothesize that a large portion of this analysis is already present in formal functional specifications. They examine this hypothesis by analyzing a particular variety of formal specifications, namely Z specifications, in the context of a general specification-based testing method known as category partition testing. General guidelines are presented to derive category partition test specifications from Z functional specifications. The relationship between a Z specification and steps in the category partition method is broadly defined and illustrated with an example.<>
将基于规格说明的测试方法应用于非正式的功能规格说明需要测试工程师进行大量的分析。作者假设,这种分析的很大一部分已经出现在正式的功能规范中。他们通过分析特定种类的正式规范(即Z规范)来检验这一假设,该规范是在基于通用规范的测试方法(称为类别划分测试)的上下文中进行的。给出了从Z功能规范推导类别划分测试规范的一般准则。对类别划分方法中Z规范与步骤之间的关系进行了广义的定义,并通过实例加以说明。
{"title":"Using Z specifications in category partition testing","authors":"N. Amla, P. Ammann","doi":"10.1109/CMPASS.1992.235766","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235766","url":null,"abstract":"The application of specification-based test methods to informal functional specifications requires considerable analysis on the part of the test engineer. The authors hypothesize that a large portion of this analysis is already present in formal functional specifications. They examine this hypothesis by analyzing a particular variety of formal specifications, namely Z specifications, in the context of a general specification-based testing method known as category partition testing. General guidelines are presented to derive category partition test specifications from Z functional specifications. The relationship between a Z specification and steps in the category partition method is broadly defined and illustrated with an example.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Software safety and economics 软件安全与经济
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235759
J. Michael, E. Addy, S. Fortier, B. Junk, J. McHugh
A panel session regarding the economics of building or retrofitting safety into software systems is summarized. The issues discussed include cost benefit analysis of security systems; investment in safety-related activities; a definition of software safety; economic analysis methodology; the measurement of the economic utility of software systems, and the safety-related attributes of a system and the software life cycle; the level of formality that should be attempted in developing economic models of safety-critical software systems; and traditional cost-benefit analysis approaches for making investment decisions concerning safety-critical systems.<>
小组会议关于经济建设或改造安全的软件系统进行了总结。讨论的问题包括安全系统的成本效益分析;投资于与安全有关的活动;软件安全的定义;经济分析方法;衡量软件系统的经济效用,以及系统和软件生命周期的安全相关属性;在开发安全关键软件系统的经济模型时应该尝试的正式程度;以及传统的成本效益分析方法,用于对安全关键系统进行投资决策。
{"title":"Software safety and economics","authors":"J. Michael, E. Addy, S. Fortier, B. Junk, J. McHugh","doi":"10.1109/CMPASS.1992.235759","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235759","url":null,"abstract":"A panel session regarding the economics of building or retrofitting safety into software systems is summarized. The issues discussed include cost benefit analysis of security systems; investment in safety-related activities; a definition of software safety; economic analysis methodology; the measurement of the economic utility of software systems, and the safety-related attributes of a system and the software life cycle; the level of formality that should be attempted in developing economic models of safety-critical software systems; and traditional cost-benefit analysis approaches for making investment decisions concerning safety-critical systems.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"176 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123569743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic approach to assurance of database design 数据库设计保证的概率方法
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235763
L. Russell
A probabilistic framework for decision-making is developed. It is based on the recognition that if it is impossible to consider every case in which security might be comprised, at the least a rational method of controlling estimated risk is desirable. Multilevel secure databases are considered. The author describes several principle aggregation and inference problems, and shows how the solutions are externalized to the database designer. These externalized problems are reformulated in a context of approximate reasoning or probability. An overview of probability issues is provided and classified into two orthogonal approaches. These concepts are applied to the database design problem, and policies are provided that can be used to control decision-making for controlling in turn the probability of database inference.<>
开发了决策的概率框架。它是基于这样一种认识,即如果不可能考虑到可能包含安全的每一种情况,那么至少需要一种控制估计风险的合理方法。考虑多级安全数据库。作者描述了几个主要的聚合和推理问题,并展示了如何将解决方案外部化到数据库设计人员。这些外部化的问题在近似推理或概率的背景下被重新表述。概览概率问题提供并分为两种正交的方法。这些概念应用于数据库设计问题,并提供了可用于控制决策的策略,以反过来控制数据库推理的概率。
{"title":"A probabilistic approach to assurance of database design","authors":"L. Russell","doi":"10.1109/CMPASS.1992.235763","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235763","url":null,"abstract":"A probabilistic framework for decision-making is developed. It is based on the recognition that if it is impossible to consider every case in which security might be comprised, at the least a rational method of controlling estimated risk is desirable. Multilevel secure databases are considered. The author describes several principle aggregation and inference problems, and shows how the solutions are externalized to the database designer. These externalized problems are reformulated in a context of approximate reasoning or probability. An overview of probability issues is provided and classified into two orthogonal approaches. These concepts are applied to the database design problem, and policies are provided that can be used to control decision-making for controlling in turn the probability of database inference.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verification of numerical programs using Penelope/Ariel 验证数值程序使用Penelope/Ariel
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235765
S. Prasad
The author describes how asymptotic correctness verifications of numerical programs are performed by using the Penelope Ada verification system. The intuitive notion of closeness underlying the notion of asymptotic correctness and how the notion of asymptotic correctness is supported in Penelope are discussed. A brief description of the Penelope system followed by a discussion of how the Ada real number model is incorporated into it are included. The special mathematical operations introduced for asymptotic correctness are described. The techniques developed for asymptotic correctness proofs are illustrated by an example verification of a program for computing square roots by the Newton iteration method.<>
作者描述了如何使用Penelope Ada验证系统对数值程序进行渐近正确性验证。讨论了基于渐近正确性的直觉性概念,以及Penelope如何支持渐近正确性的概念。简要介绍了Penelope系统,然后讨论了如何将Ada实数模型纳入其中。描述了渐近正确性的特殊数学运算。本文通过一个用牛顿迭代法计算平方根的程序的实例验证来说明渐近正确性证明的技术。
{"title":"Verification of numerical programs using Penelope/Ariel","authors":"S. Prasad","doi":"10.1109/CMPASS.1992.235765","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235765","url":null,"abstract":"The author describes how asymptotic correctness verifications of numerical programs are performed by using the Penelope Ada verification system. The intuitive notion of closeness underlying the notion of asymptotic correctness and how the notion of asymptotic correctness is supported in Penelope are discussed. A brief description of the Penelope system followed by a discussion of how the Ada real number model is incorporated into it are included. The special mathematical operations introduced for asymptotic correctness are described. The techniques developed for asymptotic correctness proofs are illustrated by an example verification of a program for computing square roots by the Newton iteration method.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of computer controlled systems safety and quality assurance concerns for acquisition managers 计算机控制系统的安全和质量保证的审查,采购经理的关注
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235758
J. Friend
The author reviews the basics of software engineering, applicable safety and quality assurance standards, and how to use these standards. Included is a discussion of structured programming, verification and validation of completed program code, and testing. The software life cycle phases are highlighted with a description of how each commercial and government standard relates to a particular phase. The difference between software safety and quality assurance is a major focus. The US Department of Defense safety standard is described, and the tasks within the standard which relate to software safety are detailed. Specific recommendations for changes in Department of the Navy requirements for the use of software standards are outlined.<>
作者回顾了软件工程的基础知识,适用的安全和质量保证标准,以及如何使用这些标准。包括结构化编程的讨论,已完成的程序代码的验证和确认,以及测试。通过描述每个商业和政府标准如何与特定阶段相关联来强调软件生命周期阶段。软件安全和质量保证之间的区别是一个主要的焦点。介绍了美国国防部的安全标准,并详细介绍了该标准中与软件安全相关的任务。概述了对海军部软件标准使用要求变化的具体建议。
{"title":"A review of computer controlled systems safety and quality assurance concerns for acquisition managers","authors":"J. Friend","doi":"10.1109/CMPASS.1992.235758","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235758","url":null,"abstract":"The author reviews the basics of software engineering, applicable safety and quality assurance standards, and how to use these standards. Included is a discussion of structured programming, verification and validation of completed program code, and testing. The software life cycle phases are highlighted with a description of how each commercial and government standard relates to a particular phase. The difference between software safety and quality assurance is a major focus. The US Department of Defense safety standard is described, and the tasks within the standard which relate to software safety are detailed. Specific recommendations for changes in Department of the Navy requirements for the use of software standards are outlined.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A formal approach for security evaluation 安全评估的正式方法
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235762
J. Mcdermid, Q. Shi
The authors discuss security issues and consider the extent to which internal relations among entities in a system should be taken into account when carrying out security analysis. They present a concrete and flexible security model expressed in terms of the internal relations in the system, rather than abstract state machines. Based on this model, security analysis can be carried out by decomposing the analysis of the whole system into analyses of subsets of the relations, and the security property of the whole system can be derived by composition of these secure relation subsets.<>
作者讨论了安全问题,并考虑了在进行安全分析时应该考虑系统中实体之间的内部关系的程度。它们提供了一个具体而灵活的安全模型,用系统内部关系来表达,而不是抽象的状态机。基于该模型,可以将整个系统的分析分解为关系子集的分析来进行安全分析,并通过这些安全关系子集的组合来导出整个系统的安全属性。
{"title":"A formal approach for security evaluation","authors":"J. Mcdermid, Q. Shi","doi":"10.1109/CMPASS.1992.235762","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235762","url":null,"abstract":"The authors discuss security issues and consider the extent to which internal relations among entities in a system should be taken into account when carrying out security analysis. They present a concrete and flexible security model expressed in terms of the internal relations in the system, rather than abstract state machines. Based on this model, security analysis can be carried out by decomposing the analysis of the whole system into analyses of subsets of the relations, and the security property of the whole system can be derived by composition of these secure relation subsets.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modular verification of Ada library units Ada库单元的模块化验证
Pub Date : 1992-06-15 DOI: 10.1109/CMPASS.1992.235764
C. Marceau, W. Polak
Modular verification of Ada library units enables programmers to write and verify small program units and to compose them with minimal additional effort into larger correct programs. Penelope is a prototype verification environment for Ada that supports separate verification of program units and their composition. The authors have extended Penelope to enable verification of larger Ada programs, consisting of multiple compilation units. They discuss two major issues that arise from the composition of program modules. The first is ensuring that the composition itself is correct, that is, that assumptions made by one module about another indeed hold. The elaboration of Ada packages poses new problems, which are described along with the solution adopted. A novel technique for reducing the amount of annotation required from the user is described. The second issue is maintaining consistency between the various modules without incurring excessive overhead. The way in which a set of modules is kept consistent depends on the structure of the language. The method, called separate verification, is closely modeled on the technique of separate compilation used in Ada. How Ada techniques can be adapted for a verification environment is discussed.<>
Ada库单元的模块化验证使程序员能够编写和验证小程序单元,并以最小的额外努力将它们组合成更大的正确程序。Penelope是Ada的原型验证环境,它支持对程序单元及其组成进行单独验证。作者扩展了Penelope,使其能够验证由多个编译单元组成的更大的Ada程序。他们讨论了程序模块组成中出现的两个主要问题。首先是确保组成本身是正确的,也就是说,一个模块对另一个模块所做的假设确实成立。Ada包的细化带来了新的问题,本文将对这些问题与所采用的解决方案一起进行描述。描述了一种用于减少用户所需注释量的新技术。第二个问题是在不产生过多开销的情况下维护各个模块之间的一致性。一组模块保持一致的方式取决于语言的结构。这种方法被称为单独验证,它与Ada中使用的单独编译技术密切相关。讨论了如何将Ada技术应用于验证环境
{"title":"Modular verification of Ada library units","authors":"C. Marceau, W. Polak","doi":"10.1109/CMPASS.1992.235764","DOIUrl":"https://doi.org/10.1109/CMPASS.1992.235764","url":null,"abstract":"Modular verification of Ada library units enables programmers to write and verify small program units and to compose them with minimal additional effort into larger correct programs. Penelope is a prototype verification environment for Ada that supports separate verification of program units and their composition. The authors have extended Penelope to enable verification of larger Ada programs, consisting of multiple compilation units. They discuss two major issues that arise from the composition of program modules. The first is ensuring that the composition itself is correct, that is, that assumptions made by one module about another indeed hold. The elaboration of Ada packages poses new problems, which are described along with the solution adopted. A novel technique for reducing the amount of annotation required from the user is described. The second issue is maintaining consistency between the various modules without incurring excessive overhead. The way in which a set of modules is kept consistent depends on the structure of the language. The method, called separate verification, is closely modeled on the technique of separate compilation used in Ada. How Ada techniques can be adapted for a verification environment is discussed.<<ETX>>","PeriodicalId":153913,"journal":{"name":"COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1