Comparing Specification Paradigms: Gypsy and Z

[1]  C. A. R. Hoare,et al.  The emperor's old clothes , 1981, CACM.

[2]  Bernard Sufrin Towards a formal specification of the ICL data dictionary , 1984 .

[3]  Donald I. Good,et al.  General Message Flow Modulator , 1984 .

[4]  John McHugh,et al.  Coding for a Believable Specification to Implementation Mapping , 1987, 1987 IEEE Symposium on Security and Privacy.

[5]  Niklaus Wirth,et al.  Pascal User Manual and Report , 1991, Springer New York.

[6]  Robert S. Boyer,et al.  A verified code generator for a subset of gypsy , 1988 .

[7]  Carroll Morgan,et al.  Specification of the UNIX Filing System , 1984, IEEE Transactions on Software Engineering.

[8]  Ib Sørensen,et al.  CAVIAR: a case study in specification , 1987 .

[9]  Ian J. Hayes,et al.  Specification case studies , 1987 .

[10]  Carl E. Landwehr The Best Available Technologies for Computer Security , 1983, Computer.

[11]  J. Michael Spivey,et al.  Understanding Z : A specification language and its formal semantics , 1985, Cambridge tracts in theoretical computer science.

[12]  Magebula The two languages , 1955 .

[13]  Jock D. Mackinlay,et al.  Expressiveness of Languages , 1984, AAAI.

[14]  Donald I. Good,et al.  A verified encrypted packet interface , 1981, SOEN.

[15]  Jonathan K. Millen,et al.  Verifying Security , 1981, CSUR.

[16]  William D. Young,et al.  Secure Ada Target: Issues, System Design, and Verification , 1985, 1985 IEEE Symposium on Security and Privacy.

[17]  Conclusions , 1989 .

[18]  Cliff B. Jones,et al.  Tentative steps toward a development method for interfering programs , 1983, TOPL.