Skip to main content

Formal Methods Diffusion: Past Lessons and Future Prospects

  • Conference paper
  • First Online:
Computer Safety, Reliability and Security (SAFECOMP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1943))

Included in the following conference series:

Abstract

Based on a study by Adelard (UK) commissioned by the German Bundesamt fuer Sicherheit in der Informationstechnik this paper identifies crucial factors leading to the success or failure of the application of formal methods and provides ideas of improved technology adoption perspectives by analysing the formal methods market.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Gerhart, D. Craigen, T. Ralston, Experience with Formal Methods in Critical Systems. IEEE Software, January 1994. Reprinted in High-Integrity System Specification and Design, J.P. Bowen and M.G. Hinchey (eds.), Formal Approaches to Computing and Information Technology Series (FACIT), Springer-Verlag, April 1999.

    Google Scholar 

  2. Science Policy Research Unit, London HMSO, Evaluation of the Alvey Programme for Advanced Information Technology, 1991.

    Google Scholar 

  3. R. W. Butler et al., NASA Langley’s Research and Technology-Transfer Program in Formal Methods, available from http://shemesh.larc.nasa.gov/fm.html.

  4. P. Behm, P. Benoit, A. Faivre, J.-M. Meynadier, Meteor: A Successful Application of B in a Large Project, in [31].

    Google Scholar 

  5. L.-H. Erikson Specifying railway interlocking requirements for practical use in 15th International Conference on Computer Safety, Reliability and Security (Safecomp 96), Springer, 1996.

    Google Scholar 

  6. M.J. Morley, Safety in Railway signalling data: a behavioural analysis, in Higher Order Logic Theorem Proving and its Applications, Springer, 1993.

    Google Scholar 

  7. A. Cimatti et al., Model Checking Safety Critical Software with SPIN: An Application to a Railway Interlocking System, in 17th International Conference on Computer Safety, Reliability and Security (Safecomp 98), Springer LNCS 1516.

    Google Scholar 

  8. G. Stalmarck, A System for Determining Propositional Logic Theorems by Applying Values and Rules to Triplets that are Generated from a Formula, 1989. Swedish Patent Number 467076. U.S. Patent Number 5276897, European Patent Number 0403454.

    Google Scholar 

  9. A. Haxthausen, J. Peleska, Formal Development and Verification of a Distributed Railway Control System, in [31].

    Google Scholar 

  10. S. King, J. Hammond, R. Chapman, A. Pryor, The Value of Verification: Positive Experience of Industrial Proof, in [31].

    Google Scholar 

  11. M. Croxford, J. Sutton, Breaking Through the V and V Bottleneck, Ada Europe 1995, Springer LNCS 1031, 1996.

    Google Scholar 

  12. S. Owre et al, PVS: An Experience Report, in Applied Formal Methods.FM Trends 98, Springer LNCS 1641, 1999.

    Google Scholar 

  13. J. Rushby, Formal Methods and Digital Systems Validation for Airborne Systems, NASA Contractor Report 4551, December 1993.

    Google Scholar 

  14. G. Egger, A. Fett, P. Peppert, Formal Specification of a Safe PLC Language and its Compiler, in Proceedings Safecomp 94.

    Google Scholar 

  15. S. Stepney, Incremental Development of a High Integrity Compiler: experience from an industrial development, Third IEEE High-Assurance Systems Engineering Symposium (HASE’98), Washington DC,November 1998.

    Google Scholar 

  16. G. Lüttgen, V. Carreño, Analyzing Mode Confusion via Model Checking, in D. Dams et al.(eds.), Proceedings of the 5th and 6th SPIN Workshops., Springer LNCS 1680, 1999.

    Google Scholar 

  17. W. Zhang, Model Checking Operator Procedures, in D. Dams et al.(eds.), Proceedings of the 5th and 6th SPIN Workshops., Springer LNCS 1680, 1999.

    Google Scholar 

  18. T. Clement, I. Cottam, P. Froome, C. Jones, The Development of a Commercial’ shrink-Wrapped Application’ to Safety Integrity Level 2: The DUST-EXPERT(tm) Story, in M. Felici, K. Kanoun and A. Pasquini (eds.), Computer Safety, Reliability and Security (Safecomp 99), Springer LNCS 1698, 1999.

    Google Scholar 

  19. N. Heintze and E. Clarke (eds.). Proceedings of the Formal Methods and Security Protocols Workshop, Trento, Italy, July 1999.

    Google Scholar 

  20. J. O’Leary et al, Formally Verifying IEEE Compliance of Floating-Point Hardware, Intel Technology Journal, 1999.

    Google Scholar 

  21. A. Cohn, The Notion of Proof in Hardware Verification, in Journal of Automated Reasoning 5: 127–139, Kluwer Academic Publishers 1989.

    Article  MATH  Google Scholar 

  22. T Kuhn, The Structure of Scientific Revolutions, University of Chicago Press, 1970.

    Google Scholar 

  23. E. Rogers, Diffusion of Innovations. Free Press, New York, 1983.

    Google Scholar 

  24. G. A. Moore. Crossing the Chasm. Harper Business, 1991. See also 2nd edition 1999.

    Google Scholar 

  25. G. A. Moore. Inside the Tornado: Marketing Strategies from Silicon Valley’s Cutting Edge, Harper Business, 1995.

    Google Scholar 

  26. J Sifakis, Integration the price of success, in [31].

    Google Scholar 

  27. J. Wing, J. Woodcock and J. Davies (eds.), Proceedings of FM’99: World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bloomfield, R., Craigen, D., Koob, F., Ullmann, M., Wittmann, S. (2000). Formal Methods Diffusion: Past Lessons and Future Prospects. In: Koornneef, F., van der Meulen, M. (eds) Computer Safety, Reliability and Security. SAFECOMP 2000. Lecture Notes in Computer Science, vol 1943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40891-6_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-40891-6_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41186-4

  • Online ISBN: 978-3-540-40891-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics