Domains of application for formal methods

  • J. E. Nicholls
Conference paper
Part of the Workshops in Computing book series (WORKSHOPS COMP.)


Formal methods are often discussed as if they are concerned with purely technical actions and decisions, guided by mathematical principles. On the contrary, analysis of industrial case studies shows that the adoption and use of such methods involves many social and organisational factors which should receive at least as much study as the technical factors. Failure to give these adequate attention may be one of the causes of the slow acceptance of formal methods in industry.


Formal Method Security Model Industrial Case Study Safety Critical System Application Compendium 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Appelt, W., Carr, R., Richter, G., “The formal specification of the document structures of the ODA standard” in J.C. van Vliet (editor), Document Manipulation and Typography, Cambridge University Press, 1988.Google Scholar
  2. Arnold, D.B., Duce, D.A., Reynolds, G.J., “An approach to the formal specification of configurable models of graphics systems,” in G. Maréchal (ed.), Proc. Eurographics 87, North Holland 1987.Google Scholar
  3. Duce, D.A., “Formal specification of Graphics Software,” (Technical report, RAL).Google Scholar
  4. ISO 8613, Office Document Architecture (ODA) and Interchange Format, International Standard IS 8613, International Organization for Standardization, 1988.Google Scholar
  5. Ruggles, C.L.N. (editor), Formal Methods in Standards (A report from the BCS Working Group), Springer-Verlag, 1990.Google Scholar
  6. Anderson, T. (ed) Safe and secure computing systems, Oxford: Basil Blackwell, 1989.Google Scholar
  7. Bowen, J., Stavidrou, V., “Safety-critical systems, formal methods and standards”, Draft paper submitted for publication, PRG Oxford, 1992.Google Scholar
  8. Clarke, S., Coombes, A., McDermid, J.A., “The analysis of safety arguments in the specification of a motor speed control loop,” Technical Report YCS 136 (1990) University of York.Google Scholar
  9. Levenson, N. G., “Software safety: why, what and how,” ACM Computing Surveys, Vol 18 No 2 (June 1986) 125–163.Google Scholar
  10. Levenson, N. G., “Software safety in embedded computer system,” Comm. ACM, Vol 34 No 2 (February 1991) 36–46.Google Scholar
  11. McDermid, J.A., “Formal methods: use and relevance for the development of safety critical system,” Technical report, University of York.Google Scholar
  12. Ministry of Defence, The Procurement of Safety Critical Software in Defence Equipment, Defence Standard 00-55 (April 1991).Google Scholar
  13. Neumann, P.G., “RISKS to the public in computers and related systems,” (Cumulative index) ACM Software Engineering Notes, January 1989.Google Scholar
  14. Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.MATHGoogle Scholar
  15. D. E. Bell and L. J. La Padula, “Secure computer system: unified exposition and MULTICS,” MITRE Corporation, Technical report ESD-TR-75-306, 1976.Google Scholar
  16. Computer-Electronics Security Group, Design Methodology Requirements, U.K. Government Communications Headquarters, CESG Computer Security Memorandum No. 9, 1991.Google Scholar
  17. Computer-Electronics Security Group, A Formal Development Methodology for High Confidence Systems, U.K. Government Communications Headquarters, CESG Computer Security Memorandum F, 1991.Google Scholar
  18. DoD, “Department of Defense Trusted Computer System Evaluation Criteria,” Technical Report CSC-STD-001-83 dated 15 August 1983, DoD Computer Security Center, Fort George G. Meade, Maryland 20755. (Known as the “Orange Book”).Google Scholar
  19. J. A. Goguen, J. Meseguer, “Security Policies and Security Models,” Proceedings 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1982, 11–20.Google Scholar
  20. J. McLean, “Security Models and Information Flow,” Proceedings 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990 180–187.Google Scholar
  21. P. G. Neumann, “On the Design of Dependable Computer Systems for Critical Applications” SRI International Computer Science Laboratory, 1990, SRI-CSL-90-10.Google Scholar
  22. J. M. Rushby, “The Design and Verification of Secure Systems,” in Proceedings 8th ACM Symposium on Operating System Principles, 1981 (available as ACM Operating Systems Review 15 5).Google Scholar
  23. Sennett, C.T. (editor), High-integrity software, London: Pitman Publishing, 1989.MATHGoogle Scholar
  24. Wilkes, M.V., “Revisiting computer security in the business world,” Comm ACM 34, 8 (Aug 1991) 19–21.Google Scholar
  25. Alexander, H., Formally-based tools and techniques for human-computer dialogues, Ellis Horwood, 1987.Google Scholar
  26. Anderson, S.O., “Proving properties of interactive systems,” in Harrison and Monk (editors) People and computers: Designing for usability, Cambridge, 1986.Google Scholar
  27. Coutaz, J., “Abstractions for user interface design,” IEEE Computer, Vol 18 no 9 (1985) 31–34.CrossRefGoogle Scholar
  28. Dix, A.J., Harrison, M.D., Runciman, C., Thimbleby, H.W., “Interaction models and” the principled design of interactive systems, in European Software Engineering Conference, Springer Lecture Notes, 1987 127–135.Google Scholar
  29. Farooq, M.U., Dominick, W.D., “A survey of formal tools and models for developing user interfaces,” Int. J. Man-Machine Studies, vol 29 (1988) 479–496.CrossRefGoogle Scholar
  30. Foley, J.D., van Dam, A., Feiner, S.K., Hughes, J.F., Computer graphics: Principles and Practice, Addison-Wesley, 1990.Google Scholar
  31. Harrison, M, Thimbleby, H. (editors), Formal Methods in Human-Computer Interaction, Cambridge University Press, 1990.Google Scholar
  32. Harrison, M., “Engineering human-error tolerant software,” in Proceedings 6th 2 User Meeting, Springer Verlag, 1992 (this volume).Google Scholar
  33. Jacob, R.J.K., “Using formal specifications in the design of a human-computer interface,” Comm. ACM, Vol 26 No 4 (1983), 259–264.CrossRefGoogle Scholar
  34. Reisner, P., “Formal grammar as a tool for analyzing ease of use: some fundamental concepts,” in J.C. Thomas, M.L. Schneider (editors), Human factors in computer systems, Ablex, 1983.Google Scholar
  35. Took, R., “Putting design into practice: Formal specification and the user interface,” in Harrison, M., Thimbleby, H. (editors), Formal methods in human-computer interaction, Cambridge University Press, 1990.Google Scholar
  36. Ziegler, J., Bullinger, H.-J., “Formal models and techniques in human-computer interaction,” in Shackel, B., Richardson, S.J.(editors), Human factors for informatics usability, Cambridge 1991.Google Scholar

Copyright information

© British Computer Society 1992

Authors and Affiliations

  • J. E. Nicholls
    • 1
  1. 1.Programming Research GroupOxford University Computing LaboratoryOxfordUK

Personalised recommendations