Skip to main content
Log in

Towards a theory of consistency enforcement

  • Published:
Acta Informatica Aims and scope Submit manuscript

Abstract.

State oriented specifications with invariants occur in almost all formal specification languages. Hence the problem is to prove the consistency of the specified operations with respect to the invariants. Whilst the problem seems to be easily solvable in predicative specifications, it usually requires sophisticated verification efforts, when specifications in the style of Dijkstra's guarded commands as e.g. in the specification language B are used. As an alternative consistency enforcement will be discussed in this paper. The basic idea is to replace inconsistent operations by new consistent ones preserving at the same time the intention of the old one. More precisely, this can be formalized by consistent spezializations, where specialization is a specific partial order on operations defined via predicate transformers. It will be shown that greatest consistent specializations (GCSs) always exist and are compatible with conjunctions of invariants. Then under certain mild restrictions the general construction of such GCSs is possible. Precisely, given the GCSs of simple basic assignments the GCS of a complex operation results from replacing involved assignments by their GCSs and the investigation of a guard. In general, GCS construction can be embedded in refinement calculi and therefore strengthens the systematic development of correct programs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Additional information

Received: 28 April 1994 / 5 November 1998

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schewe, KD., Thalheim, B. Towards a theory of consistency enforcement. Acta Informatica 36, 97–141 (1999). https://doi.org/10.1007/s002360050155

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s002360050155

Keywords

Navigation