Skip to main content

A Formal Methods Case Study: Using Light-Weight VDM for the Development of a Security System Module

  • Conference paper
  • First Online:
Computer Safety, Reliability and Security (SAFECOMP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1943))

Included in the following conference series:

Abstract

This paper describes a formal methods case study in which one module of an existing security system was re-developed using the light-weight Vienna Development Method, supported by the IFAD Toolbox. With respect to the original version, formal methods — even in its light-weight form — has increased software quality while the development efforts were comparable. The team that has used conventional methods for the development of the original version discusses the relevance of the findings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.-R. Abrial. The B-Book: Assigning Programs to Meanings. Cambridge University Press, 1996.

    Google Scholar 

  2. J.-R. Abrial. System study: Method and example. Unpublished, 1999.

    Google Scholar 

  3. P. Behm, P. Benoit, A. Faivre, and J.-M. Meynadier. METEOR: A successful application of B in a large project. In J. M. Wing, J. Woodcock, and J. Davies, editors, Proceedings of FM’99 — Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, number 1708/1709 in Lecture Notes in Computer Science, pages 369–387. Springer-Verlag, 1999.

    Google Scholar 

  4. J. Bicarregui, J. Dick, and E. Woods. Quantitative analysis of an application of formal methods. In M.-C. Gaudel and J. Woodcock, editors, FME’96: Industrial Benefit and Advances in Formal Methods, volume 1051 of Lecture Notes in Computer Science, pages 60-?? Springer-Verlag, 1996.

    Google Scholar 

  5. T. M. Brookes, J. S. Fitzgerald, and P. G. Larsen. Formal and informal specifications of a secure system component: Final results in a comparative study. volume 1051 of Lecture Notes in Computer Science, pages 214-?? Springer-Verlag, 1996.

    Google Scholar 

  6. J. P. Bowen and M. G. Hinchey. Ten commandments of formal methods. Computer, 28(4):56–63, April 1995.

    Google Scholar 

  7. D. Craigen, S. Gerhart, and T. Ralston. Case study: Paris Metro signaling system. IEEE Software, 11(1):32–35, January 1994.

    Google Scholar 

  8. M. Chaudron, J. Tretmans, and K. Wijbrans. Lessons from the application of formal methods to the design of a storm surge barrier control system. In J. M. Wing, J. Woodcock, and J. Davies, editors, Proceedings of FM’99 —Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, number nu1708/1709 in Lecture Notes in Computer Science, pages 1511–1526. Springer-Verlag, 1999.

    Google Scholar 

  9. S. Dellacherie. The specification and verification of an access control system using the LPV technology. PhD thesis, University of Caen, France, 1999.

    Google Scholar 

  10. L. Devauchelle, P. G. Larsen, and H. Voss. PICGAL: Practical use of formal specification to develop a complexcrit ical system. In J. Fitzgerald, C. B. Jones, and P. Lucas, editors, FME’97: Industrial Applications and Strengthened Foundations of Formal Methods. Proc. 4th Intl. Symposium of Formal Methods Europe, Graz, Austria, September 1997, volume 1313 of Lecture Notes in Computer Science, pages 221-?? Springer-Verlag, 1997.

    Google Scholar 

  11. E. H. Dürr, N. Plat, and M. de Boer. CombiCom: Tracking and tracing rail traffic using VDM++. In M. G. Hinchey and J. P. Bowen, editors, Applications of Formal Methods, Series in Computer Science, pages 203–226. Prentice Hall, 1995.

    Google Scholar 

  12. G. Droschl. Analyzing the requirements of an access control using VDMTools and PVS (abstract). In Proceedings of FM’99, number 1708/1709 in Lecture Notes in Computer Science. Springer-Verlag, September 1999.

    Google Scholar 

  13. G. Droschl. Design and application of a test case generator for VDM-SL. In Workshop Materials: VDM in Practice!, Part of FM’99. Springer-Verlag, September 1999.

    Google Scholar 

  14. G. Droschl. Events and scenarios in VDM and PVS. In 3rd Irish Workshop in Formal Methods, Galway, Electronic Workshops in Computing. Springer-Verlag, July 1999.

    Google Scholar 

  15. G. Droschl. Using PVS for requirements analysis of an access control. Australian Journal of Information Systems, 7(1):146–157, September 1999. Special issue on Requirements Engineering.

    Google Scholar 

  16. G. Droschl. Formal Specification and Analysis of Requirements in Software Development. PhD thesis, Institute for Software Technology, TU-Graz, Austria, April 2000. Supervisor: Peter Lucas.

    Google Scholar 

  17. R. Elmstrøm, P. G. Larsen, and P. B. Lassen. The IFAD VDM-SL toolbox: A practical approach to formal specifications. ACM SIGPLAN Notices, 29(9):77–80, September 1994.

    Article  Google Scholar 

  18. J. Fitzgerald and P. G. Larsen. Modelling Systems — Practical Tools and Techniques in Software Development. Cambridge University Press, 1998.

    Google Scholar 

  19. I. Houston and S. King. CICS project report: Experiences and results from the use of Z in IBM. volume 551 of Lecture Notes in Computer Science, pages 588-?? Springer-Verlag, 1991.

    Google Scholar 

  20. C. B. Jones. Systematic Software Development Using VDM. Prentice-Hall International, second edition, 1990.

    Google Scholar 

  21. W. Kuhn and E. Schoitsch. Dependability of scaleable, distributed systems: Communication strategies for redundant processes. In Proceedings of Safecomp’93, Poznan, Poland. Springer-Verlag, 1993.

    Google Scholar 

  22. N. Plat and P. G. Larsen. An overview of the ISO/VDM-SL standard. Sigplan Notices, 27(8):76–82, August 1992.

    Article  Google Scholar 

  23. M. Spivey. Introducing Z: A Specification Language and its Formal Semantics. Cambridge University Press, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Droschl, G., Kuhn, W., Sonneck, G., Thuswald, M. (2000). A Formal Methods Case Study: Using Light-Weight VDM for the Development of a Security System Module. In: Koornneef, F., van der Meulen, M. (eds) Computer Safety, Reliability and Security. SAFECOMP 2000. Lecture Notes in Computer Science, vol 1943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40891-6_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-40891-6_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41186-4

  • Online ISBN: 978-3-540-40891-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics