By Topic

A taxonomy of the causes of proof failures in applications using the HDM methodology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
K. S. Lindsay ; Magnavox Electron. Syst. Co., Ashburn, VA, USA

A methodology for formal verification and validation based on HDM (Hierarchical Development Methodology) is described. The HDM formula generator and theorem prover is used to perform data flow analysis on the system specification. In applying this methodology, the author discovered that although there may be a large number of individual proof failures, there were always only a small number of distinct causes of the failures. The taxonomy of the causes of these proof failures is discussed. The causes of proof failures are discussed in connection with the following categories: actual and formal parameters, printer copying, data dictionary, partial and complete copy, packed access, resolved in context, propagation resultant, and indirect integrity

Published in:

Aerospace Computer Security Applications Conference, 1988., Fourth

Date of Conference:

12-16 Dec 1988