12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007) 2007
DOI: 10.1109/iceccs.2007.45
|View full text |Cite
|
Sign up to set email alerts
|

Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2009
2009

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…That is, after the preliminary work in typesetting and consistency checking [4], our current experiment has not revealed any impediment to mechanising the IBM CICS specifications. The File Control module has been entirely mechanised.…”
Section: Discussionmentioning
confidence: 62%
See 1 more Smart Citation
“…That is, after the preliminary work in typesetting and consistency checking [4], our current experiment has not revealed any impediment to mechanising the IBM CICS specifications. The File Control module has been entirely mechanised.…”
Section: Discussionmentioning
confidence: 62%
“…student (Konstantinos Mokos) typeset the original CICS report into the theorem prover. This took him around two months (in 2006) and produced the preliminary results discussed in [4]. From there, another MSc.…”
Section: Resultsmentioning
confidence: 96%
“…This is much like what was implemented for the IBM CICS transaction processing system [24,23], which has some mechanised models available [14,38,56,18], and is further discussed below (see Section 6).…”
Section: Real-time Os-wrapping and Os-resources Translation Layersmentioning
confidence: 99%
“…They were the file control [24] and task control [23] API's [14,38,56,18]. They are important because they enabled us to inject fault tolerance for files, as well as the conditions under which API's can be called.…”
Section: Ibm Cics and Fault Tolerancementioning
confidence: 99%
“…This ranges from explorations of modelling the tree structures characteristic of filesystems (e.g. acyclic graphs), in Event-B using the Rodin platform [DBA08], to comprehensive machine verification of the POSIX Z model [FWF09] and part of the IBM CICS system [FWZ09]. Finally, we note recent work looking at computational models of flash memory devices with performance issues in mind [ABJ + 09], of possible interest to the formal verification community as they suggest the kinds of optimisations to be considered during the later stages in the refinement to code.…”
Section: Related Workmentioning
confidence: 99%