Skip to main content

Reliability

  • Chapter 3: Techniques
  • Chapter
  • First Online:
Software Engineering

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 30))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4. References

  1. NATO Report on SOFTWARE ENGINEERING, Garmish, Oct. 1968. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.

    Google Scholar 

  2. Ichbiah, J. Compagnie Internationale pour l' Informatique private communications.

    Google Scholar 

  3. Elspas, B. et al "Software Reliability", IEEE COMPUTER, Vol. 1, No. 1, Jan. 1971.

    Google Scholar 

  4. Henderson, P. and Snowden R. "An experiment in structured programming", Technical Report 18, Computer Laboratory, University of Newcastle upon Tyne, 1971.

    Google Scholar 

  5. Naur, P. "Proof of Algorithms by General Snapshots", BIT, Vol. 6, No. 4, pp. 310–316, 1966.

    Google Scholar 

  6. Floyd, R.W. "Assigning Meanings to Programs", Proceedings of a Symposium in Applied Mathematics, Mathematical Aspects of Computer Science, Vol. 19, pp. 19–32, J.T. Schwartz (Ed.), American Mathematical Society, Providence, Rhode Island, 1967.

    Google Scholar 

  7. London, R.L. "Computer Programs can be Proved Correct", Proceedings of the Fourth Systems Symposium — Formal Systems and Non-Numerical Problem Solving by Computers, held at Case-Western Reserve University, 1968.

    Google Scholar 

  8. London, R.L. "Certification of the Algorithm Treesort", Communications of the ACM, Vol. 13, No. 6, pp. 371–373, 1970.

    Google Scholar 

  9. Hoare, C.A.R. "An Axiomatic Basis for Computer Programming", Communications of the ACM, Vol. 12, No. 10, 1969.

    Google Scholar 

  10. Clark, B. and Horning, J. "The system language for project SUE", SIGPLAN Symposium for Languages for Systems Implementation, 1971.

    Google Scholar 

  11. Snowden, R. "PEARL: An interactive system for the preparation and validation of structured programs", Technical Report 28, Computer Laboratory, University of Newcastle upon Tyne, 1971.

    Google Scholar 

  12. Manna, Z. and Pnueli, A. "Formalization of Properties of Recursively Defined Functions", ACM Symposium of Theory of Computing, pp. 201–210, 1969.

    Google Scholar 

  13. Luckman, D. "The Resolution Principle in Theorem Proving", Machine Intelligence 1, Collins and Michie (Eds.), American Elsevier, Inc., New York 1967.

    Google Scholar 

  14. King, J. C. and Floyd, R. W. "Interpretation Oriented Theorem Prover Over Integers", Second Annual ACM Symposium on Theory of Computing, pp. 169–179, 1970.

    Google Scholar 

  15. Dijkstra, E. W. "The Structure of THE Multiprogramming System. CACM 11, 5, May 1968, 341–346.

    Google Scholar 

  16. NATO Report on SOFTWARE ENGINEERING, Rome, Oct. 1969. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.

    Google Scholar 

  17. Habermann, N. "Synchronization of Communicating Processes", Third Symposium on Operating Systems Principles, Palo Alto, 1971.

    Google Scholar 

  18. Coffman, E. et al "System deadlocks", ACM Computing Surveys, Vol. 3, No. 2, June 1971.

    Google Scholar 

  19. Belday, L. and Lehmann, M. "Programming System Dynamics" IBM Report RC 3546, September 1971.

    Google Scholar 

  20. Lampson, B. W. "Dynamic Protection Structures", Proc. AFIPS Conf. 35, 1969 FJCC.

    Google Scholar 

  21. Lampson, B. "Protection", Proceedings of the Fifth Annual Princeton Conference on Information Sciences and Systems, March 1971, p. 437–443.

    Google Scholar 

  22. Graham, S. and Denning, P. "Protection: Principles and Practice", Tech. Report No. 101, Princeton University Electrical Engineering Dept. to appear in SJCC 1972.

    Google Scholar 

  23. Dijkstra, E. W. "Cooperating Sequential Processes" in Programming Languages (F. Genuys ed.) Academic Press 1968 p. 43–112.

    Google Scholar 

  24. Conway, R. W. et al "Security and Privacy in Information Systems — A Functional Model" Tech. Report No. 133, Dept. of Operations Research, Cornell University, June 1971, to appear in CACM.

    Google Scholar 

  25. "COSINE Report on Operating Systems", available through Commission on Education, National Academy of Engineering, 2101 Constitution Avenue, Washington, D.C. 20418.

    Google Scholar 

  26. Schroeder, M. and Saltzer, J. "A Hardware Architecture for Implementing Protection Rings", Proceedings of the Third Symposium on Operating Systems Principles, October 18–20, p. 42–54.

    Google Scholar 

  27. Graham, R. M. "Protection in an Informations Processing Utility", CACM 11, 5, May 1968.

    Google Scholar 

  28. Project SUE internal documentation workbook. Computer Systems Research Group, University of Toronto.

    Google Scholar 

  29. Brinch, Hansen P. "The Nucleus of a Multiprogramming System", CACM 13, April 1970.

    Google Scholar 

  30. Hoffman, L. "Computers and Privacy", ACM Computing Surveys, Vol. 1, No. 2, June 1969.

    Google Scholar 

  31. Gotlieb, C. C. and Hume, P. "Systems Capacity for Data Security". Draft report for study 6 of Privacy and Computers Task Force.

    Google Scholar 

  32. Petersen, H. E. and Turn, R. "System implications of information privacy". Proc. AFIPS 1967 Spring Joint Comput. Conf., Vol. 30, Thompson Book Co., Washington, D.C., pp. 291–300.

    Google Scholar 

  33. Shannon, C. E. "Communication theory of secrecy systems", Bell Syste. Tech. J. 28, 4, Oct. 1949, 656–715.

    Google Scholar 

  34. Baran, P. On distributed communications: IX. Security, secrecy and tamper-free considerations. Doc. RM-3765-PR Rand Corp., Santa Monica, Calif., August 1964.

    Google Scholar 

  35. Hsiao, D. K. "A File System for a Problem Solving Facility". Ph.D. Diss. in Electrical Engineering, U. of Pennsylvania, Philadelphia, Pa., 1968.

    Google Scholar 

  36. Hoffman, L. "The formulary model for access control and privacy in computer systems", SLAC Rept. No. 117, Stanford University, May 1970.

    Google Scholar 

  37. Beardsley C. "Is your computer insecure". IEEE Spectrum, January 1972.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

F. L. Bauer J. B. Dennis W. M. Waite C. C. Gotlieb R. M. Graham M. Griffiths H. J. Helms B. Morton P. C. Poole D. Tsichritzis

Rights and permissions

Reprints and permissions

Copyright information

© 1975 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Tsichritzis, D. (1975). Reliability. In: Bauer, F.L., et al. Software Engineering. Lecture Notes in Computer Science, vol 30. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-07168-7_80

Download citation

  • DOI: https://doi.org/10.1007/3-540-07168-7_80

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-07168-6

  • Online ISBN: 978-3-540-37502-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics