Advertisement

Formal Methods for Trustworthy Computer Systems (FM89)

Report from FM89: A Workshop on the Assessment of Formal Methods for Trustworthy Computer Systems. 23–27 July 1989, Halifax, Canada

  • Dan Craigen
  • Karen Summerskill

Part of the Workshops in Computing book series (WORKSHOPS COMP.)

Table of contents

  1. Front Matter
    Pages i-x
  2. Dan Craigen, Karen Summerskill
    Pages 1-2
  3. Dan Craigen, Karen Summerskill
    Pages 3-7
  4. Dan Craigen, Karen Summerskill
    Pages 9-31
  5. Dan Craigen, Karen Summerskill
    Pages 33-62
  6. John Rushby, Jeannette Wing, Carl Landwehr
    Pages 63-85
  7. Dan Craigen, Karen Summerskill
    Pages 87-89
  8. Dan Craigen, Karen Summerskill
    Pages 91-97
  9. Back Matter
    Pages 99-248

About these proceedings

Introduction

The 1989 Workshop on the Assessment of Formal Methods for Trustworthy Com­ puter Systems (FM89} was an invitational workshop that brought together repre­ sentatives from the research, commercial and governmental spheres of Canada, the United Kingdom, and the United States. The workshop was held in Halifax, Nova Scotia, Canada, from July 23 through July 27, 1989. This document reports the activities, observations, recommendations and conclusions resulting. from FM89. 1. 1 Purpose of Workshop The primary purpose for holding FM89 was to assess the role of formal methods in the development and fielding of trustworthy critical systems. The need for this assessment was predicated upon four observations: 1. Critical systems are increasingly being controlled by computer systems; 2. Existing techniques for developing, assuring and certifying computer-based critical systems are inadequate; 3. Formal methods have the potential for playing the same role in the devel­ opment of computer-based systems as applied mathematics does for other engineering disciplines; and 4. Formal methods have had limited impact on the development of comput- based systems and supporting technologies. · The goal of the workshop was to complete the following tasks: 1. Assess the problems retarding the development of trustworthy critical systems; 2. Determine the (potential) impact of applying formal methods techniques to the development of trustworthy critical systems; 3. Determine the research and development required to facilitate a broader ap­ plication of formal methods techniques; 4.

Keywords

computer computer security critical systems development formal method formal methods

Editors and affiliations

  • Dan Craigen
    • 1
  • Karen Summerskill
    • 1
  1. 1.Odyssey Research AssociatesOttawaCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4471-3532-6
  • Copyright Information Springer-Verlag London 1990
  • Publisher Name Springer, London
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-19635-8
  • Online ISBN 978-1-4471-3532-6
  • Series Print ISSN 1431-1682
  • Buy this book on publisher's site