skip to main content
article
Free access

INATEST: an interactive environment for testing formal specifications

Published: 01 August 1985 Publication History

Abstract

No abstract available.

References

[1]
{EK 84} Eckmann, S., and R. Kemmerer, "Preliminary Inatest User's Manual," Department of Computer Science, University of California, Santa Barbara, California, May 1984.
[2]
{GLC 84} Gold, B., R. Linde, and P. Cudney, "KVM/370 in Retrospect," Proceedings of the 1984 Symposium on Security and Privacy, Oakland, California, April 1984.
[3]
{HAK 83} Hinke, T., J. Althouse, and R. Kemmerer, "SDC Secure Release Terminal Project," Proceedings of the 1983 Symposium on Security and Privacy, Oakland, California, April 1983.
[4]
{Kem 85} Kemmerer, R., "Testing Formal Specifications to Detect Design Errors," to appear in IEEE Transactions on Software Engineering, January 1985.
[5]
{LSS 80} Locasso, R., J. Scheid, V. Schorre, and P. Eggert, "The Ina Jo Specification Language Reference Manual," SDC document TM-6889/000/01, System Development Corporation, Santa Monica, California, November 1980.

Cited By

View all
  • (2021)Automated verification tools for cryptographic protocols2021 International Conference on Promising Electronic Technologies (ICPET)10.1109/ICPET53277.2021.00017(58-65)Online publication date: Nov-2021
  • (2011)Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE.2011.5930095(63-68)Online publication date: May-2011
  • (2008)Operating System SecuritySynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00126ED1V01Y200808SPT0011:1(1-218)Online publication date: Jan-2008
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 10, Issue 4
Proceedings of VERkshop III -- a formal verification workshop
August 1985
135 pages
ISSN:0163-5948
DOI:10.1145/1012497
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1985
Published in SIGSOFT Volume 10, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)3
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Automated verification tools for cryptographic protocols2021 International Conference on Promising Electronic Technologies (ICPET)10.1109/ICPET53277.2021.00017(58-65)Online publication date: Nov-2021
  • (2011)Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE.2011.5930095(63-68)Online publication date: May-2011
  • (2008)Operating System SecuritySynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00126ED1V01Y200808SPT0011:1(1-218)Online publication date: Jan-2008
  • (2007)So You Think You Can Dance?Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)10.1109/ACSAC.2007.49(3-17)Online publication date: Dec-2007
  • (2004)Verification TechniquesCryptographic Security Architecture10.1007/0-387-21551-4_4(127-166)Online publication date: 2004
  • (2002)Formal methods: the very ideaScience of Computer Programming10.1016/S0167-6423(01)00026-042:1(11-27)Online publication date: Jan-2002
  • (2000)Analyzing Encryption Protocols Using Formal Verification Techniques (Extended Abstract)Advances in Cryptology — CRYPTO ’8710.1007/3-540-48184-2_26(289-305)Online publication date: 1-Dec-2000
  • (1999)Formal Methods:Electronic Notes in Theoretical Computer Science10.1016/S1571-0661(04)00127-625(10-22)Online publication date: 1999
  • (1997)Using CSP to Detect Errors in the TMN ProtocolIEEE Transactions on Software Engineering10.1109/32.63714823:10(659-669)Online publication date: 1-Oct-1997
  • (1995)ReferencesIndustrial Applications of Formal Methods to Model, Design and Analyze Computer Systems10.1016/B978-0-8155-1362-9.50027-5(74-77)Online publication date: 1995
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media