메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 62-74

An approach to synthesise safe systems

Author keywords

formal methods; program transformation; reliability; safe systems; security

Indexed keywords


EID: 77954341184     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.010824     Document Type: Article
Times cited : (19)

References (25)
  • 3
  • 7
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy, and formal derivation of programs
    • Dijkstra, E.W. (1975) ‘Guarded commands, nondeterminacy, and formal derivation of programs’, Communications of the ACM, Vol. 18, No. 8, pp.453–457.
    • (1975) Communications of the ACM , vol.18 , Issue.8 , pp. 453-457
    • Dijkstra, E.W.1
  • 9
    • 0013036571 scopus 로고    scopus 로고
    • Transformational approaches to the specification and verification of fault-tolerant systems: formal background and classification
    • October, Special Issue on Dependability Evaluation and Assessment
    • Gärtner, F. (1999) ‘Transformational approaches to the specification and verification of fault-tolerant systems: formal background and classification’, Journal of Universal Computer Science (J.UCS), Vol. 5, No. 10, pp.668–692, October, Special Issue on Dependability Evaluation and Assessment.
    • (1999) Journal of Universal Computer Science (J.UCS) , vol.5 , Issue.10 , pp. 668-692
    • Gärtner, F.1
  • 11
    • 0027683191 scopus 로고
    • Another glance at the Alpern-Schneider characterization of safety and liveness in concurrent executions
    • Gumm, H.P. (1993) ‘Another glance at the Alpern-Schneider characterization of safety and liveness in concurrent executions’, Information Processing Letters, Vol. 47, No. 6, pp.291–294.
    • (1993) Information Processing Letters , vol.47 , Issue.6 , pp. 291-294
    • Gumm, H.P.1
  • 12
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • Hamlen, K.W., Morrisett, G. and Schneider, F.B. (2000) ‘Computability classes for enforcement mechanisms’, j-TOPLAS, Vol. 28, No. 1, pp.175–205.
    • (2000) j-TOPLAS , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 14
    • 0011590590 scopus 로고    scopus 로고
    • On systematic design of consistent executable assertions for distributed embedded software
    • Compilers and Tools for Embedded Systems/Software and Compilers for Embedded Systems (LCTES/SCOPES)
    • Jhumka, A., Hiller, M., Claesson, V. and Suri, N. (2002) ‘On systematic design of consistent executable assertions for distributed embedded software’, Proceedings of the ACM Joint Conference on Languages, Compilers and Tools for Embedded Systems/Software and Compilers for Embedded Systems (LCTES/SCOPES), pp.74–83.
    • (2002) Proceedings of the ACM Joint Conference on Languages , pp. 74-83
    • Jhumka, A.1    Hiller, M.2    Claesson, V.3    Suri, N.4
  • 15
    • 0003823005 scopus 로고    scopus 로고
    • PhD Thesis, Department of Computer and Information Science, The Ohio State University
    • Kulkarni, S.S. (1999) ‘Component based design of fault-tolerance’, PhD Thesis, Department of Computer and Information Science, The Ohio State University.
    • (1999) Component based design of fault-tolerance
    • Kulkarni, S.S.1
  • 18
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport, P. (1977) ‘Proving the correctness of multiprocess programs’, IEEE Transactions on Software Engineering, Vol. 3, No. 2, pp.125–143.
    • (1977) IEEE Transactions on Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, P.1
  • 19
    • 0025414676 scopus 로고
    • The use of self checks and voting in software error detection: an empirical study
    • Leveson, N.G., Cha, S.S., Knight, J.C. and Shimeall, T.J. (1990) ‘The use of self checks and voting in software error detection: an empirical study’, IEEE Transactions on Software Engineering, Vol. 16, No. 4, pp.432–443.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.4 , pp. 432-443
    • Leveson, N.G.1    Cha, S.S.2    Knight, J.C.3    Shimeall, T.J.4
  • 20
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: enforcement mechanisms for run-time security policies
    • Ligatti, J., Bauer, L. and Walker, D. (2005) ‘Edit automata: enforcement mechanisms for run-time security policies’, International Journal of Information Security, Vol. 4, Nos. 1/2, pp.2–16.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 21
    • 0003785253 scopus 로고
    • PhD Thesis, University of Warwick, Department of Computer Science
    • Liu, Z. (1991) ‘Fault-tolerant programming by transformations’, PhD Thesis, University of Warwick, Department of Computer Science.
    • (1991) Fault-tolerant programming by transformations
    • Liu, Z.1
  • 22
    • 0000173020 scopus 로고
    • Transformation of programs for fault-tolerance
    • Liu, Z. and Joseph, M. (1992) ‘Transformation of programs for fault-tolerance’, Formal Aspects of Computing, Vol. 4, No. 5, pp.442–469.
    • (1992) Formal Aspects of Computing , vol.4 , Issue.5 , pp. 442-469
    • Liu, Z.1    Joseph, M.2
  • 23
    • 0028766543 scopus 로고
    • A compositional framework for fault-tolerance by specification transformation
    • Peled, D. and Joseph, M. (1994) ‘A compositional framework for fault-tolerance by specification transformation’, Theoretical Computer Science, Vol. 128, pp.99–125.
    • (1994) Theoretical Computer Science , vol.128 , pp. 99-125
    • Peled, D.1    Joseph, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.