Preview
Unable to display preview. Download preview PDF.
4. References
NATO Report on SOFTWARE ENGINEERING, Garmish, Oct. 1968. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.
Ichbiah, J. Compagnie Internationale pour l' Informatique private communications.
Elspas, B. et al "Software Reliability", IEEE COMPUTER, Vol. 1, No. 1, Jan. 1971.
Henderson, P. and Snowden R. "An experiment in structured programming", Technical Report 18, Computer Laboratory, University of Newcastle upon Tyne, 1971.
Naur, P. "Proof of Algorithms by General Snapshots", BIT, Vol. 6, No. 4, pp. 310–316, 1966.
Floyd, R.W. "Assigning Meanings to Programs", Proceedings of a Symposium in Applied Mathematics, Mathematical Aspects of Computer Science, Vol. 19, pp. 19–32, J.T. Schwartz (Ed.), American Mathematical Society, Providence, Rhode Island, 1967.
London, R.L. "Computer Programs can be Proved Correct", Proceedings of the Fourth Systems Symposium — Formal Systems and Non-Numerical Problem Solving by Computers, held at Case-Western Reserve University, 1968.
London, R.L. "Certification of the Algorithm Treesort", Communications of the ACM, Vol. 13, No. 6, pp. 371–373, 1970.
Hoare, C.A.R. "An Axiomatic Basis for Computer Programming", Communications of the ACM, Vol. 12, No. 10, 1969.
Clark, B. and Horning, J. "The system language for project SUE", SIGPLAN Symposium for Languages for Systems Implementation, 1971.
Snowden, R. "PEARL: An interactive system for the preparation and validation of structured programs", Technical Report 28, Computer Laboratory, University of Newcastle upon Tyne, 1971.
Manna, Z. and Pnueli, A. "Formalization of Properties of Recursively Defined Functions", ACM Symposium of Theory of Computing, pp. 201–210, 1969.
Luckman, D. "The Resolution Principle in Theorem Proving", Machine Intelligence 1, Collins and Michie (Eds.), American Elsevier, Inc., New York 1967.
King, J. C. and Floyd, R. W. "Interpretation Oriented Theorem Prover Over Integers", Second Annual ACM Symposium on Theory of Computing, pp. 169–179, 1970.
Dijkstra, E. W. "The Structure of THE Multiprogramming System. CACM 11, 5, May 1968, 341–346.
NATO Report on SOFTWARE ENGINEERING, Rome, Oct. 1969. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.
Habermann, N. "Synchronization of Communicating Processes", Third Symposium on Operating Systems Principles, Palo Alto, 1971.
Coffman, E. et al "System deadlocks", ACM Computing Surveys, Vol. 3, No. 2, June 1971.
Belday, L. and Lehmann, M. "Programming System Dynamics" IBM Report RC 3546, September 1971.
Lampson, B. W. "Dynamic Protection Structures", Proc. AFIPS Conf. 35, 1969 FJCC.
Lampson, B. "Protection", Proceedings of the Fifth Annual Princeton Conference on Information Sciences and Systems, March 1971, p. 437–443.
Graham, S. and Denning, P. "Protection: Principles and Practice", Tech. Report No. 101, Princeton University Electrical Engineering Dept. to appear in SJCC 1972.
Dijkstra, E. W. "Cooperating Sequential Processes" in Programming Languages (F. Genuys ed.) Academic Press 1968 p. 43–112.
Conway, R. W. et al "Security and Privacy in Information Systems — A Functional Model" Tech. Report No. 133, Dept. of Operations Research, Cornell University, June 1971, to appear in CACM.
"COSINE Report on Operating Systems", available through Commission on Education, National Academy of Engineering, 2101 Constitution Avenue, Washington, D.C. 20418.
Schroeder, M. and Saltzer, J. "A Hardware Architecture for Implementing Protection Rings", Proceedings of the Third Symposium on Operating Systems Principles, October 18–20, p. 42–54.
Graham, R. M. "Protection in an Informations Processing Utility", CACM 11, 5, May 1968.
Project SUE internal documentation workbook. Computer Systems Research Group, University of Toronto.
Brinch, Hansen P. "The Nucleus of a Multiprogramming System", CACM 13, April 1970.
Hoffman, L. "Computers and Privacy", ACM Computing Surveys, Vol. 1, No. 2, June 1969.
Gotlieb, C. C. and Hume, P. "Systems Capacity for Data Security". Draft report for study 6 of Privacy and Computers Task Force.
Petersen, H. E. and Turn, R. "System implications of information privacy". Proc. AFIPS 1967 Spring Joint Comput. Conf., Vol. 30, Thompson Book Co., Washington, D.C., pp. 291–300.
Shannon, C. E. "Communication theory of secrecy systems", Bell Syste. Tech. J. 28, 4, Oct. 1949, 656–715.
Baran, P. On distributed communications: IX. Security, secrecy and tamper-free considerations. Doc. RM-3765-PR Rand Corp., Santa Monica, Calif., August 1964.
Hsiao, D. K. "A File System for a Problem Solving Facility". Ph.D. Diss. in Electrical Engineering, U. of Pennsylvania, Philadelphia, Pa., 1968.
Hoffman, L. "The formulary model for access control and privacy in computer systems", SLAC Rept. No. 117, Stanford University, May 1970.
Beardsley C. "Is your computer insecure". IEEE Spectrum, January 1972.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1975 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Tsichritzis, D. (1975). Reliability. In: Bauer, F.L., et al. Software Engineering. Lecture Notes in Computer Science, vol 30. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-07168-7_80
Download citation
DOI: https://doi.org/10.1007/3-540-07168-7_80
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-07168-6
Online ISBN: 978-3-540-37502-9
eBook Packages: Springer Book Archive