Abstract
In this paper we highlight three verification case studies with the Kiv system (Karlsruhe Interactive Verifier, [HRS90]). The case studies pursue different aims and illustrate different aspects of verification. The paper reports on our experiences, presents a detailed productivity analysis of the Kiv system, and gives an impression of the typical verification problems that show up in practical applications. Furthermore, these case studies can serve as a challenge for other verification systems.
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi, M. Burrows, B. Lampson and G. Plotkin. A Calculus for Access Control in Distributed Systems. In CRYPTO 91, Proceedings. 1991.
J. ter Bekke. Semantic Data Modeling. Prentice Hall, 1992.
F. Cornelius, H. Hußmann and M. Löwe. The Korso Case Study for Software Engineering with Formal Methods: A Medical Information System. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).
T. Fuchß. Translating E/R-diagrams into Consistent Database Specifications. Technical Report 2/94, Fakultät für Informatik, Universität Karlsruhe, Germany, 1994.
R. Hettler. Übersetzung von E/R-Modellen nach Spectrum. Technical Report I9333, TU München, Germany, 1993 (in german).
R. Hettler, H. Hußmann, S. Merz, F. Nickel and O. Slotosch. Die funktionale Essenz von HDMS-A. Technical Report I9335, Fakultät für Informatik, TU München, Germany, 1993 (in german).
M. Heisel, W. Reif and W. Stephan. Tactical Theorem Proving in Program Verification. 10th International Conference on Automated Deduction, Kaiserslautern, FRG, Springer LNCS 1990.
P.A. Larson. Dynamic Hashing. BIT 18 (1978).
P. Pepper, M. Wirsing, et al. A Method for the Development of Correct Software. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).
W. Reif. Verification of Large Software Systems. In Shyamasundar (ed.), Foundations of Software Technology and Theoretical Computer Science, Proceedings, New Dehli, India. Springer LNCS 1992.
W. Reif. The KIV-Approach to Software Verification. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).
W. Reif and K. Stenzel. Reuse of Proofs in Software Verification. In Shyamasundar (ed.), Foundation of Software Technology and Theoretical Computer Science, Proceedings, Bombay, India. Springer LNCS 1993.
K. Stenzel. A Verified Access Control Model. Technical Report 26/93, Fakultät für Informatik, Universität Karlsruhe, Germany, 1993.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Fuchß, T., Reif, W., Schellhorn, G., Stenzel, K. (1995). Three selected case studies in verification. In: Broy, M., Jähnichen, S. (eds) KORSO: Methods, Languages, and Tools for the Construction of Correct Software. Lecture Notes in Computer Science, vol 1009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0015472
Download citation
DOI: https://doi.org/10.1007/BFb0015472
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60589-8
Online ISBN: 978-3-540-47802-7
eBook Packages: Springer Book Archive