Nothing Special   »   [go: up one dir, main page]

Skip to main content

Three selected case studies in verification

  • Case Studies
  • Chapter
  • First Online:
KORSO: Methods, Languages, and Tools for the Construction of Correct Software

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1009))

Abstract

In this paper we highlight three verification case studies with the Kiv system (Karlsruhe Interactive Verifier, [HRS90]). The case studies pursue different aims and illustrate different aspects of verification. The paper reports on our experiences, presents a detailed productivity analysis of the Kiv system, and gives an impression of the typical verification problems that show up in practical applications. Furthermore, these case studies can serve as a challenge for other verification systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi, M. Burrows, B. Lampson and G. Plotkin. A Calculus for Access Control in Distributed Systems. In CRYPTO 91, Proceedings. 1991.

    Google Scholar 

  2. J. ter Bekke. Semantic Data Modeling. Prentice Hall, 1992.

    Google Scholar 

  3. F. Cornelius, H. Hußmann and M. Löwe. The Korso Case Study for Software Engineering with Formal Methods: A Medical Information System. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).

    Google Scholar 

  4. T. Fuchß. Translating E/R-diagrams into Consistent Database Specifications. Technical Report 2/94, Fakultät für Informatik, Universität Karlsruhe, Germany, 1994.

    Google Scholar 

  5. R. Hettler. Übersetzung von E/R-Modellen nach Spectrum. Technical Report I9333, TU München, Germany, 1993 (in german).

    Google Scholar 

  6. R. Hettler, H. Hußmann, S. Merz, F. Nickel and O. Slotosch. Die funktionale Essenz von HDMS-A. Technical Report I9335, Fakultät für Informatik, TU München, Germany, 1993 (in german).

    Google Scholar 

  7. M. Heisel, W. Reif and W. Stephan. Tactical Theorem Proving in Program Verification. 10th International Conference on Automated Deduction, Kaiserslautern, FRG, Springer LNCS 1990.

    Google Scholar 

  8. P.A. Larson. Dynamic Hashing. BIT 18 (1978).

    Google Scholar 

  9. P. Pepper, M. Wirsing, et al. A Method for the Development of Correct Software. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).

    Google Scholar 

  10. W. Reif. Verification of Large Software Systems. In Shyamasundar (ed.), Foundations of Software Technology and Theoretical Computer Science, Proceedings, New Dehli, India. Springer LNCS 1992.

    Google Scholar 

  11. W. Reif. The KIV-Approach to Software Verification. In Broy, Jähnichen (eds.), Korso, Correct Software by Formal Methods. Springer LNCS 1995. (In this volume).

    Google Scholar 

  12. W. Reif and K. Stenzel. Reuse of Proofs in Software Verification. In Shyamasundar (ed.), Foundation of Software Technology and Theoretical Computer Science, Proceedings, Bombay, India. Springer LNCS 1993.

    Google Scholar 

  13. K. Stenzel. A Verified Access Control Model. Technical Report 26/93, Fakultät für Informatik, Universität Karlsruhe, Germany, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Manfred Broy Stefan Jähnichen

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Fuchß, T., Reif, W., Schellhorn, G., Stenzel, K. (1995). Three selected case studies in verification. In: Broy, M., Jähnichen, S. (eds) KORSO: Methods, Languages, and Tools for the Construction of Correct Software. Lecture Notes in Computer Science, vol 1009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0015472

Download citation

  • DOI: https://doi.org/10.1007/BFb0015472

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60589-8

  • Online ISBN: 978-3-540-47802-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics