Comparing Specification Paradigms: Gypsy and Z

作者: William D. Young

DOI:

关键词: Systems engineeringSoftware engineeringComputer science

摘要:

参考文章(14)
Trevor Vickers, Carroll Morgan, On the Refinement Calculus ,(1988)
J. Strother Moore, William David Young, Robert S. Boyer, A verified code generator for a subset of gypsy The University of Texas at Austin. ,(1988)
J. Hartmanis, P. Brinch Hansen, D. Gries, Kathleen Jensen, C. Moler, G. Seegmüller, Niklaus Wirth, N. Wirth, G. Goos, Pascal user manual and report ,(1975)
Ib Holm Sørensen, Bill Flinn, CAVIAR: a case study in specification Specification case studies. pp. 141- 188 ,(1987)
W.E. Boebert, R.Y. Kaln, W.D. Young, S.A. Hansohn, Secure Ada Target: Issues, System Design, and Verification ieee symposium on security and privacy. pp. 176- 183 ,(1985) , 10.1109/SP.1985.10022
Michael K. Smith, Ann E. Siebert, Benedetto L. DiVito, Donald I. Good, A verified encrypted packet interface ACM SIGSOFT Software Engineering Notes. ,vol. 6, pp. 13- 16 ,(1981) , 10.1145/1010832.1010838
Bernard Sufrin, Towards a formal specification of the ICL Data Dictionary Specification case studies. pp. 189- 217 ,(1987)
William D. Young, John Mchugh, Coding for a Believable Specification to Implementation Mapping ieee symposium on security and privacy. pp. 140- 140 ,(1987) , 10.1109/SP.1987.10003
Landwehr, The Best Available Technologies for Computer Security IEEE Computer. ,vol. 16, pp. 86- 100 ,(1983) , 10.1109/MC.1983.1654445
C. B. Jones, Tentative steps toward a development method for interfering programs ACM Transactions on Programming Languages and Systems. ,vol. 5, pp. 596- 619 ,(1983) , 10.1145/69575.69577