Advertisement

X-by-Construction

  • Maurice H. ter Beek
  • Loek Cleophas
  • Ina SchaeferEmail author
  • Bruce W. Watson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11244)

Abstract

After decades of progress on Correctness-by-Construction (CbC) as a scientific discipline of engineering, it is time to look further than correctness and investigate a move from CbC to XbC, i.e., considering also non-functional properties. X-by-Construction (XbC) is concerned with a step-wise refinement process from specification to code that automatically generates software (system) implementations that by construction satisfy specific non-functional properties concerning security, dependability, reliability or resource/energy consumption, to name but a few. This track brings together researchers and practitioners that are interested in CbC and the promise of XbC.

References

  1. 1.
    ter Beek, M.H., Hähnle, R., Schaefer, I.: Correctness-by-construction and post-hoc verification: friends or foes? In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 723–729. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-47166-2_51CrossRefGoogle Scholar
  2. 2.
    Bijo, S., Johnsen, E.B., Pun, K.I., Seidl, C., Tarifa, S.L.T.: Deployment by construction for multicore architectures. In: Margaria, T., Steffen, B. (Eds.) ISoLA 2018, LNCS 11244, pp. 448–465 (2018)Google Scholar
  3. 3.
    Cavoukian, A.: Privacy by design. IEEE Technol. Soc. Magaz. 31(4), 18–19 (2012)CrossRefGoogle Scholar
  4. 4.
    Dijkstra, E.W.: A constructive approach to the problem of program correctness. BIT Numer. Math. 8(3), 174–186 (1968)CrossRefGoogle Scholar
  5. 5.
    Given-Wilson, T., Legay, A.: X-by-C: non-functional security challenges. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 486–501. Springer, Cham (2018)Google Scholar
  6. 6.
    Hall, A.: Correctness by construction: integrating formality into a commercial development process. In: Eriksson, L.-H., Lindsay, P.A. (eds.) FME 2002. LNCS, vol. 2391, pp. 224–233. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45614-7_13CrossRefGoogle Scholar
  7. 7.
    Hall, A., Chapman, R.: Correctness by construction: developing a commercial secure system. IEEE Softw. 19(1), 18–25 (2002)CrossRefGoogle Scholar
  8. 8.
    Hoare, C.A.R.: Proof of a program: FIND. Commun. ACM 14(1), 39–45 (1971)CrossRefGoogle Scholar
  9. 9.
    Huisman, M., Blom, S., Darabi, S., Safari, M.: Program correctness by transformation. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 365–380. Springer, Cham (2018)Google Scholar
  10. 10.
    Lybecait, M., Kopetzki, D., Steffen, B.: Design for ‘X’ through model transformation. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 381–398. Springer, Cham (2018)Google Scholar
  11. 11.
    Méry, D.: Modelling by patterns for correct-by-construction process. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 399–423. Springer, Cham (2018)Google Scholar
  12. 12.
    Poll, E.: (Some) security by construction through a LangSec approach. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. xx–yy. Springer, Cham (2018)Google Scholar
  13. 13.
    Schaefer, I., Runge, T., Knüppel, A., Cleophas, L., Kourie, D., Watson, B.W.: Towards confidentiality-by-construction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 502–515. Springer, Cham (2018)Google Scholar
  14. 14.
    Schneider, G.: Is privacy by construction possible? In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 471–485. Springer, Cham (2018)Google Scholar
  15. 15.
    Steinhöfel, D., Hähnle, R.: Modular, correct compilation with automatic soundness proofs. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 424–447. Springer, Cham (2018)Google Scholar
  16. 16.
    Tribastone, M.: Towards software performance by construction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11244, pp. 466–470. Springer, Cham (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Maurice H. ter Beek
    • 1
  • Loek Cleophas
    • 2
    • 3
  • Ina Schaefer
    • 4
    Email author
  • Bruce W. Watson
    • 3
    • 5
  1. 1.ISTI–CNRPisaItaly
  2. 2.TU EindhovenEindhovenThe Netherlands
  3. 3.Stellenbosch UniversityStellenboschSouth Africa
  4. 4.TU BraunschweigBraunschweigGermany
  5. 5.CAIRStellenboschSouth Africa

Personalised recommendations