The Z notation: a reference manual
The Z notation: a reference manual
Protocol testing: review of methods and relevance for software testing
ISSTA '94 Proceedings of the 1994 ACM SIGSOFT international symposium on Software testing and analysis
The B-book: assigning programs to meanings
The B-book: assigning programs to meanings
An experiment in automatic generation of test suites for protocols with verification technology
Science of Computer Programming - Special issue on COST 247, verification and validation methods for formal descriptions
The Unified Modeling Language user guide
The Unified Modeling Language user guide
Consistency checking for multiple view software architectures
ESEC/FSE-7 Proceedings of the 7th European software engineering conference held jointly with the 7th ACM SIGSOFT international symposium on Foundations of software engineering
Social processes and proofs of theorems and programs
Communications of the ACM
The 4+1 View Model of Architecture
IEEE Software
CASTING: A Formally Based Software Test Generation Method
ICFEM '97 Proceedings of the 1st International Conference on Formal Engineering Methods
Hi-index | 0.00 |
Our goal in this paper is not to enrich the literature with yet another defence of formal methods, but rather to build on our experience of using and studying formal methods in security to provide an industrial point of view, with a strong emphasis on practicality. We also hope that, even if we take our inspiration mainly in the security area, most of our observations on formal methods are relevant to other application domains as well. The term "security" itself can be used in various contexts with different meanings. We use it here in the sense of security of information, as defined by the standard triptych: confidentiality, integrity and availability.