[1993] Proceedings Third Great Lakes Symposium on VLSI-Design Automation of High Performance VLSI Systems
DOI: 10.1109/glsv.1993.224474
|View full text |Cite
|
Sign up to set email alerts
|

Rapid-prototyping of high-assurance systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…This process generates a set of critical requirements that must be satisfied by any further refinement. Although this is the extent of the repeater refinement in this document, this specification is consistent with the repeater specified in [1], from which a VHDL design and gate-level hardware description were derived.…”
Section: Structure Of This Documentmentioning
confidence: 57%
See 2 more Smart Citations
“…This process generates a set of critical requirements that must be satisfied by any further refinement. Although this is the extent of the repeater refinement in this document, this specification is consistent with the repeater specified in [1], from which a VHDL design and gate-level hardware description were derived.…”
Section: Structure Of This Documentmentioning
confidence: 57%
“…The application that we choose to demonstrate this approach, an RS-232 character repeater, was originally posed as a non-trivial, security-relevant example on which to determine the feasibility of formal methods [15]. Our use of literate programming techniques (1) demonstrates how a formal assurance argument can be presented in a clear and intuitive manner and (2) ensures that the documentation of the argument is consistent with the actual specification, implementation, and proof. This document was written using literate programming techniques and tools and is itself a literate program.…”
Section: Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…1 The assurance argument supports the accreditation decision to allow a computer to process classi ed information in an operational environment. The argument is composed from technical evidence that is produced during the system development process, e.g., the security model, design speci cations, proofs, vulnerability analysis and test results.…”
Section: Introductionmentioning
confidence: 99%
“…Rigorously produced evidence that is di cult to understand conWork performed while author was employed by the Naval Research Laboratory. 1 A computer system is trusted if we rely on it for security enforcement. I t i s trustworthy if that reliance is justi ed technically.…”
Section: Introductionmentioning
confidence: 99%