Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Development methods for trusted computer systems

Published: 01 March 1989 Publication History

Conclusion

Well-designed computer systems can be safer than hardwired alternatives, and computer systems can control processes which are too complex for hardwired solutions, or where the hardwired solution is uneconomic.

References

References

[1]
ACM Software Engineering Notes, 4,2 (1979).
[2]
Computing Australia, 13 June 1988.
[3]
Cullyer, W. J.:Should We Trust Computers? Lecture to the Society for the Application of Research, Cambridge, UK. RSRE, St Andrews Rd, Gt Malvern, Worcestershire WR14 3PS.
[4]
Cullyer, W. J.: Implementing Safety-Critical Systems: the VIPER Microprocessor, In:Proc. Workshop on Hardware Verification, Calgary, Canada, January 1987.
[5]
Defence Standard 00-55.
[6]
Dijkstra, E. W.:A Discipline of Programming. Prentice-Hall, 1976.
[7]
Fetzer, J. H.: Program Verification: the Very Idea.Communications of the ACM, 31 (1988).
[8]
Hoare C. A. R. An Axiomatic Basis for Computer Programming Communications of the ACM 1969 12 576-580
[9]
International Electrotechnical Committee [IEC] WG65A, TC9 and TC10.
[10]
Jones, C. B.:Systematic Software Development Using VDM. Prentice-Hall, 1986.
[11]
Leveson, N.:ACM Computing Surveys, 18, 1986.
[12]
Neumann, P. (ed.):ACM Forum on Risks to the Public in Computers and Related Systems. Extracts reprinted inACM Software Engineering Notes. The Forum is published electronically on USENET as newsgroup comp. risks.
[13]
Thomas, M.:Should We Trust Computers? BCS/Unisys Annual Lecture 1988, available from Maureen Murphy, BCS, 13, Mansfield Street, London W1 (10).
[14]
UK Health and Safety Executive (unpublished).

Index Terms

  1. Development methods for trusted computer systems
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Formal Aspects of Computing
    Formal Aspects of Computing  Volume 1, Issue 1
    Mar 1989
    410 pages
    ISSN:0934-5043
    EISSN:1433-299X
    Issue’s Table of Contents

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 March 1989
    Revision received: 15 November 1988
    Received: 15 July 1988
    Published in FAC Volume 1, Issue 1

    Author Tags

    1. Safety critical computer systems
    2. Trustworthiness
    3. Good practice
    4. Formal methods

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 62
      Total Downloads
    • Downloads (Last 12 months)36
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media