skip to main content
article
Free access

An Ina Jo® proof manager for the formal development method

Published: 01 August 1985 Publication History

Abstract

This paper describes methods for decomposing large conjectures into smaller ones in order to make their proof easier and for limiting the amount of reproving that occurs when a specification is modified. It proposes a tool, based on these methods, for managing the proofs of conjectures about an evolving specification.

References

[1]
{DOD81} "Requirements for the Ada Programming Support Environment: STONEMAN," Technical Report, U.S. Department of Defense (1981).]]
[2]
{ADA83} "Ada Language Reference Manual," MIL-STD-1815A, U.S. Department of Defense (1983).]]
[3]
{Bry82} Berry, D. M., "The Application of the Formal Development Methodology to Data Base Design and Integrity Verification," Proceedings of Fourth Israel Conference on Software Quality Assurance (1982).]]
[4]
{Fel78} Feldman, S. I., "Make --- A Program for Maintaining Computer Programs," Technical Report, Bell Laboratories, Murray Hill, NJ (1978).]]
[5]
{Ger78} Gerhart, S. L., "Program Verification in the 1980s: Problems, Perspectives, and Opportunities," ISI/RR-78-71, USC Information Sciences Institute, Marina Del Rey, CA (August, 1978).]]
[6]
{Kem79} Kemmerer, R. A., "Formal Verification of the UCLA Security Kernel: Abstract Model, Mapping Functions, Theorem Generation, and Proofs," Ph.D. Dissertation, Computer Science Department, UCLA (1979).]]
[7]
{LSSE80} Locasso, R., Scheid, J., Schorre, D. V., and Eggert, P. R., "The Ina Jo Reference Manual," TM-(L)-6021/001/000, System Development Corporation, Santa Monica, CA (June 27, 1980).]]
[8]
{Mil7?} Millen, J. K., "Validation of the PDP-11/45 Security Kernel: Upper Level Specification," Technical Report, Mitre Corp., New Bedford, MA(197?).]]
[9]
{DLP79} Millo, R. A. De, Lipton, R. J., and Perlis, A., "Social Processes and Proofs of Theorems and Programs," Communications of the ACM22(5), pp. 271--280 (1979).]]
[10]
{Mor79} Moriconi, M. S., "A Designer/Verifier's Assistant," IEEE Transactions on Software EngineeringSE-5(4), pp. 387--401 (July, 1979).]]
[11]
{Mye75} Myers, G. J., Reliable Software through Composite Design, Petrocelli/Charter, New York, NY (1975).]]
[12]
{Par72} Parnas, D. L., "On the Criteria to be Used in Decomposing Systems into Modules," Communications of the ACM15(2), pp. 1053--1058 (December, 1972).]]
[13]
{SS84} Schorre, D. V. and Stein, J., "The Interactive Theorem Prover (ITP) User Manual," Tech. Report TM-6889/006/01, System Development Corporation, Santa Monica, CA (1984).]]
[14]
{PC80} Smallberg, D. A. and London, R, "Private Communication," USC ISI (1980).]]
[15]
{Tic81} Tichy, W., Revision Control System, Purdue University, Lafayette, IN (1981).]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 10, Issue 4
Proceedings of VERkshop III -- a formal verification workshop
August 1985
135 pages
ISSN:0163-5948
DOI:10.1145/1012497
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1985
Published in SIGSOFT Volume 10, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)3
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media