Formal methods for trustworthy computer systems (FM89) : report from FM89--a Workshop on the Assessment of Formal Methods for Trustworthy Computer Systems, 23-27 July 1989, Halifax, Canada

Bibliographic Information

Formal methods for trustworthy computer systems (FM89) : report from FM89--a Workshop on the Assessment of Formal Methods for Trustworthy Computer Systems, 23-27 July 1989, Halifax, Canada

Dan Craigen, editor, and Karen Summerskill, assitant editor

(Workshops in computing)

Springer-Verlag, c1990

  • gw
  • us

Available at  / 8 libraries

Search this Book/Journal

Note

"Published in collaboration with the British Computer Society."

Description and Table of Contents

Description

The 1989 Workshop on the Assessment of Formal Methods for Trustworthy Com puter Systems (FM89} was an invitational workshop that brought together repre sentatives from the research, commercial and governmental spheres of Canada, the United Kingdom, and the United States. The workshop was held in Halifax, Nova Scotia, Canada, from July 23 through July 27, 1989. This document reports the activities, observations, recommendations and conclusions resulting. from FM89. 1. 1 Purpose of Workshop The primary purpose for holding FM89 was to assess the role of formal methods in the development and fielding of trustworthy critical systems. The need for this assessment was predicated upon four observations: 1. Critical systems are increasingly being controlled by computer systems; 2. Existing techniques for developing, assuring and certifying computer-based critical systems are inadequate; 3. Formal methods have the potential for playing the same role in the devel opment of computer-based systems as applied mathematics does for other engineering disciplines; and 4. Formal methods have had limited impact on the development of comput- based systems and supporting technologies. * The goal of the workshop was to complete the following tasks: 1. Assess the problems retarding the development of trustworthy critical systems; 2. Determine the (potential) impact of applying formal methods techniques to the development of trustworthy critical systems; 3. Determine the research and development required to facilitate a broader ap plication of formal methods techniques; 4.

Table of Contents

1 Introduction.- 2 Workshop Organization.- 3 Critical Systems.- 4 Formal Methods.- 5 Reports From Working Groups.- 6 Concluding Discussions.- 7 Conclusions and Recommendations.- A Participants.- B Potential Applications for Formal Methods.- C Respondents' Papers.- C.1 Formal Methods and Critical Systems in the Real World.- C.2 Whither Formal Methods?.- D Illustrative Risks to the Public in the Use of Computer Systems and Related Technology.- E A Survey of Formal Methods and Techniques.- F Acronyms.- G Copyrights and Trademarks.- References.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top