Fak Fur Informatik’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Three Selected Case Studies in Verification
  • Article

October 1996

·

5 Reads

·

3 Citations

Thomas Fuch

·

Wolfgang Reif

·

Gerhard Schellhorn

·

[...]

·

Fak Fur Informatik

. In this paper we highlight three verification case studies with the Kiv system (Karlsruhe Interactive Verifier, [HRS90]). The case studies pursue different aims and illustrate different aspects of verification. The paper reports on our experiences, presents a detailed productivity analysis of the Kiv system, and gives an impression of the typical verification problems that show up in practical applications. Furthermore, these case studies can serve as a challenge for other verification systems. 1 Introduction The three case studies are concerned with three different applications: data security, translation of E/R-diagrams to formal specifications, and efficient data access using dynamic hashing. Data security has been selected since it is a typical application where formal methods can be extremely helpful to detect and to avoid errors. Verification is required both for the algorithms that implement the access control mechanism, as well as for the requirements of the security...

Citations (1)


... KIV is a proof system with quite a long tradition [HHRS86] [HRS91] [Rei95] [BRS + 00], the author of this thesis is one of its developers. It has been used in large case studies [SB94] [FRSS95] [SA98] [ORS + 02] The core of KIV are structured algebraic specifications [Wir90] [CoF04] [Rei91] [Rei92a] [ Rei93] with an excellent proof support for them. Algebraic specifications can be used to specify a complete software system; or they allow a user to specify arbitrary data types and operations like bounded integers, floating point arithmetic, graphs, pointer structures, etc. ...

Reference:

Verification of JavaCard Programs
Three Selected Case Studies in Verification
  • Citing Article
  • October 1996