Assurance in high-integrity software

This book is concerned with the production and assessment of software for high-integrity systems. Many of these systems, for example nuclear reactor and flight control systems, are subject to public enquiries or certification before they can be deployed. In general it is necessary to provide assurance to non-technical personnel of the safety or security of a system containing computers and software, and possibly involving sophisticated human-computer interaction. Thus we require techniques and measures which can be used to achieve and to demonstrate the security, integrity or safety of such systems; the measures must be accessible and convincing to laymen including the systems’ operators.

[1]  James W. Freeman,et al.  Structuring Systems for Formal Verification , 1985, 1985 IEEE Symposium on Security and Privacy.

[2]  Donald I. Good,et al.  Mechanical proofs about computer programs , 1984, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.

[3]  Bev Littlewood,et al.  Evaluation of competing software reliability predictions , 1986, IEEE Transactions on Software Engineering.

[4]  Brian David Bramson Malvern's program analysers , 1985 .

[5]  Aloysius K. Mok,et al.  Safety analysis of timing properties in real-time systems , 1986, IEEE Transactions on Software Engineering.

[6]  Cliff B. Jones,et al.  Systematic software development using VDM , 1986, Prentice Hall International Series in Computer Science.

[7]  Andrew F. Monk,et al.  Mode Errors: A User-Centered Analysis and Some Preventative Measures Using Keying-Contingent Sound , 1986, Int. J. Man Mach. Stud..

[8]  Peter G. Bishop,et al.  PODS — A project on diverse software , 1986, IEEE Transactions on Software Engineering.

[9]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[10]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[11]  William B. Rouse,et al.  Human-Computer Interaction in the Control of Dynamic Systems , 1981, CSUR.

[12]  Peter Checkland,et al.  Systems Thinking, Systems Practice , 1981 .

[13]  Donald A. Norman,et al.  Four stages of user activities , 1984 .

[14]  Harold W. Thimbleby,et al.  Interaction Models and the Principled Design of Interactive Systems , 1987, ESEC.

[15]  Nancy G. Leveson,et al.  Analyzing Software Safety , 1983, IEEE Transactions on Software Engineering.

[16]  B. A. Sheil,et al.  The Psychological Study of Programming , 1981, CSUR.

[17]  John McDermid,et al.  Life cycle support in the Ada environment , 1983, ALET.

[18]  Claude E. Walston,et al.  A Method of Programming Measurement and Estimation , 1977, IBM Syst. J..

[19]  Anas N. Al-Rabadi,et al.  A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .

[20]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[21]  Brian Randell,et al.  A Distributed Secure System , 1983, 1983 IEEE Symposium on Security and Privacy.

[22]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[23]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[24]  Martin R. Woodward,et al.  Experience with Path Analysis and Testing of Programs , 1980, IEEE Transactions on Software Engineering.