Certifying Airport Security Regulations Using the Focal Environment

@inproceedings{Delahaye2006CertifyingAS,
  title={Certifying Airport Security Regulations Using the Focal Environment},
  author={David Delahaye and Jean-Fr{\'e}d{\'e}ric {\'E}tienne and V{\'e}ronique Donzeau-Gouge},
  booktitle={FM},
  year={2006}
}
We present the formalization of regulations intended to ensure airport security in the framework of civil aviation. In particular, we describe the formal models of two standards, one at the international level and the other at the European level. These models are expressed using the Focal environment, which is also briefly presented. Focal is an object-oriented specification and proof system, where we can write programs together with properties which can be proved semi-automatically. We show… 

Formal Modeling of Airport Security Regulations using the Focal Environment

An automatic transformation of Focal specifications to UML class diagrams is proposed, in order to provide a graphical documentation of formal models for developers, and in the long-term, for certification authorities.

Reasoning about Airport Security Regulations Using the Focal Environment

These models are expressed using the Focal environment, an object- oriented specification and proof system, and the proofs described by means of a declarative-like language are processed by the automated theorem prover Zenon.

A formal and sound transformation from Focal to UML: an application to airport security regulations

An automatic transformation of Focal specifications to UML class diagrams is proposed to provide a graphical documentation of formal models for developers, and in the long-term, for certification authorities.

Producing UML Models from Focal Specifications: An Application to Airport Security Regulations

An automatic transformation of focal specifications to UML class diagrams is proposed to provide a graphical documentation of formal models for developers, and in the long-term, for certification authorities.

Development Life-cycle of Critical Software Under FoCaL

Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environment

A modular implementation of a generic framework for the definition of security policies together with certified enforcement mechanism for these policies is obtained.

Secure Software within Focal

Focal is an IDE providing powerful functional and object-oriented features that allow to formally express specification and to go step by step (in an incremental approach) to design and implement while proving that the implementation meets its specification or design requirements.

Developing structured libraries using the Focal environment

The Focal environment is introduced, which is an integrated development environment, offering functional and object-oriented features, and designed to build certified components using theorem proving, and a compilation scheme based on modules is proposed, which aims to provide a higher level view of compiled specifications supplying in particular traceability.

Compiling Programs and Proofs: FoCaLiZe Internals

A detailed presentation of the compilation scheme, supported by an original treatment of the dependencies induced by the combination of computational and logical constructs, which ensures that OCaml and Coq produced codes are error-free and provides compact generated code.

Approches formelles dans l'assistance au développement de logiciels

A disprover plugin for RODIN that utilizes the ProB animator and model checker to automatically find counterexamples for a given problematic proof obligation, so the user can directly investigate the source of the problem and should not attempt to prove the proof obligation.

References

SHOWING 1-4 OF 4 REFERENCES

Formalisation and implementation of access control models

  • M. JaumeC. Morisset
  • Computer Science
    International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
  • 2005
A formalisation of access control models based on the work on an algebra of security models by J. McLean (1988) is presented and how it can be used to obtain a particular security model: the Bell and La Padula security model is described.

The B-book - assigning programs to meanings

Tribute Foreword Introduction Part I. Mathematics: 1. Mathematical reasoning 2. Set notation 3. Mathematical objects Part II. Abstract Machines: 4. Introduction to abstract machines 5. Formal

How to Write a Proof

The structure of mathematical proofs has not changed in 300 years, and as many as a third of all papers published in mathematical journals contain mistakes not just minor errors, but incorrect theorems and proofs.

Building certified components within FOCAL

A process is provided for fabricating MOSFET devices having field source, gate and drain regions and electrical contacts thereto by forming a comparatively thick oxide film on a semiconductor surface, implanting p-type ions under conditions such that the peak distribution of p- type atoms lies in the semi-conductor substrate just beneath the semiconductor/-oxide interface.