Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
PASCAL user manual and report
Gypsy: A language for specification and implementation of verifiable programs
Proceedings of an ACM conference on Language design for reliable software
A study of protection in programming languages
Proceedings of an ACM conference on Language design for reliable software
The purpose of concurrent Pascal
Proceedings of the international conference on Reliable software
Proceedings of the international conference on Reliable software
Report on the programming language Euclid
ACM SIGPLAN Notices
A discipline for constructing multiphase communication protocols
ACM Transactions on Computer Systems (TOCS)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
An exercise in constructing multi-phase communication protocols
SIGCOMM '84 Proceedings of the ACM SIGCOMM symposium on Communications architectures and protocols: tutorials & symposium
Validating The Utility Of Abstraction Techniques
ACM '78 Proceedings of the 1978 annual conference
A Report On The Development Of Gypsy
ACM '78 Proceedings of the 1978 annual conference
Survey of protocol definition and verification techniques
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
A comprehensive methodology that has been developed for constructing verifiably reliable and secure computing systems is summarized. The methodology can be applied to many different kinds of systems, but is specifically oriented toward communications processing systems. The methodology is a system of methods for attaining total system reliability and is based on constructing verified software and highly reliable hardware. The methodology has been formulated by bringing a diversity of advanced research concepts to bear on the real problems of communications systems. This has led to the development and integration of* program specification methods* program proof methods* program validation methods* a program design language* a program design system* hardware designs to support verified software* hardware reliability analysis and enhancement methods into a coherent methodology for constructing verifiably reliable and secure systems. The methodology has been successfully applied to the experimental design of a secure message switching system structured as a packet-switched computer network.