Correctness by Construction: Developing a Commercial Secure System

  title={Correctness by Construction: Developing a Commercial Secure System},
  author={Anthony Hall and Roderick Chapman},
  journal={IEEE Software},
0 7 4 0 7 4 5 9 / 0 2 / $ 1 7 . 0 0 © 2 0 0 2 I E E E unexpected ways. If the software in question is securityor safety-critical, this uncertainty is unacceptable. We must build software that is correct by construction, not software whose behavior is uncertain until after delivery. Correctness by construction is possible and practical. It demands a development process that builds correctness into every step. It demands rigorous requirements definition, precise system-behavior specification… CONTINUE READING
Highly Cited
This paper has 192 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 115 extracted citations

Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP

2008 32nd Annual IEEE Software Engineering Workshop • 2008
View 8 Excerpts
Highly Influenced

The specifications of E-Commerce Secure System using Z language

Mustafa M. Noaman, mustafa. monaf, Jordan ialsmadi, Jordan ameera
View 5 Excerpts
Highly Influenced

An Interface Design Secure Measurement Model for Improving Web App Security

2011 International Conference on Broadband and Wireless Computing, Communication and Applications • 2011
View 4 Excerpts
Highly Influenced

The rise, fall and persistence of Ada

SIGAda • 2010
View 3 Excerpts
Highly Influenced

Concurrent Software Testing Method Based on CSP and PAT

2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS) • 2018
View 1 Excerpt

Modeling and analysis of the disruptor framework in CSP

2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) • 2018
View 1 Excerpt

192 Citations

Citations per Year
Semantic Scholar estimates that this publication has 192 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-8 of 8 references

and J

S. Robertso
Robertson, Mastering the Requirements Process, Addison-Wesley, Reading, Mass., • 1999

High Integrity Ada: The SPARK Approach, Addison-Wesley

J. Barnes

Object-Oriented Development: The Fusion Method

D. Coleman

The Z notation - a reference manual

Prentice Hall International Series in Computer Science • 1989

Similar Papers

Loading similar papers…