skip to main content
10.1145/800127.804078acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

A Report On The Development Of Gypsy

Published:04 December 1978Publication History

ABSTRACT

The first version of Gypsy was introduced in 1976 to support the specification and construction of verified programs. A second version has evolved based on the experiences of the last two years. The changes introduced in the second version are described. Some experiences with the specification and proof methodology are discussed, and the status of the implementation of the Gypsy compiler and verification system is summarized.

References

  1. 1.A. Ambler, D.I. Good, W.F. Burger. "Report on the Language Gypsy", The University of Texas at Austin, ICSCA-CMP-1 August, 1976.Google ScholarGoogle Scholar
  2. 2.Per Brinch Hansen. Operating Systems Principles, Prentice-Hall, 1973.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Per Brinch Hansen. "The Purpose of Concurrent Pascal", In Proceedings ICRS, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D.I. Good, ed. "Constructing Verifiably Reliable and Secure Communications Processing Systems", Final Report of the Certifiable Minicomputer Project, ICSCA-CMP-6, The University of Texas at Austin, 1977.Google ScholarGoogle Scholar
  5. 5.D.I. Good. "Constructing Verified and Reliable Communications Processing Systems", ACM Software Engineering Notes, 2-3, October, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D.I. Good, R.M. Cohen, C.G. Hoch, L.W. Hunter, D.F. Hare. "Report on the Language Gypsy: Version 2.0", Certifiable Minicomputer Project, ICSCA-CMP-10, The University of Texas at Austin, 1978.Google ScholarGoogle Scholar
  7. 7.D.I. Good and R.M. Cohen. "Verifiable Communications Processing in Gypsy", in Proceedings of Compcon, '78, September, 1978.Google ScholarGoogle Scholar
  8. 8.D.I. Good, R.M. Cohen, J. Keeton-Williams. "Principles of Proving Concurrent Programs in Gypsy", in Proceedings of 6th Symposium on Principles of Programming Languages, January, 1979 (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.J.B. Goodenough. "Exception Handling: Issues and a Proposed Notation", CACM 18, 12, December, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.C.A.R. Hoare. "Proof of Correctness of Data Representations", In Acta Informatica, 4, 1972.Google ScholarGoogle Scholar
  11. 11.C.A.R. Hoare and N. Wirth. "An Axiomatic Definition of the Programming Language PASCAL", In Acta Informatica 2, 1973.Google ScholarGoogle Scholar
  12. 12.C.A.R. Hoare. "Monitors - an Operating System Structuring Concept", In CACM 17-10, October, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Charles G. Hoch. Hardware Support for Modern Software Concepts, Ph.D. Thesis, University of Texas at Austin, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.Gary R. Horn. "Specifications for a Secure Computer Communications Network", Master's Thesis, The University of Texas at Austin, 1977.Google ScholarGoogle Scholar
  15. 15.J. Howard. "Proving Monitors Correct", In CACM 19-5, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.S. Igarashi, R.L. London, D.C. Luckham. "Automatic Program Verification I: A Logical Basis and Its Implementation", In Report ISI/RR-73-11, Information Science Institute, USC, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.K. Jensen and N. Wirth. Pascal User Manual and Report, Springer Verlag, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.A.K. Jones and B.H. Liskov. "A Language Extension for Expressing Constraints on Data Access", CACM, 21, 5, May, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.B. Liskov and S. Zilles. "An Approach to Abstraction", In Computation Structures Group Memo 88, MIT, 1973.Google ScholarGoogle Scholar
  20. 20.Mark S. Moriconi. "A System for Incrementally Designing & Verifying Program", Ph.D. Thesis, The University of Texas at Austin, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.P.G. Neumann, L. Robinson, K.N. Levitt, R.S. Boyer, A.R. Saxena. "A Provably Secure Operating System", SRI Project 2581, prepared for USAECOM, June, 1975.Google ScholarGoogle Scholar
  22. 22.D. L. Parnas. "A Technique for Software Module Specification with Examples", In |CACM 15-5, May, 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.L.C. Ragland. "A Verified Program Verifier", PhD Thesis, University of Texas at Austin, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.O. Roubine and L. Robinson. "SPECIAL Reference Manual", Stanford Research Institute, August, 1976.Google ScholarGoogle Scholar
  25. 25.B.J. Walker. "Verification of the UCLA Security Kernel: Data Defined Specifications", Master's Thesis, University of California at Los Angeles, 1977.Google ScholarGoogle Scholar
  26. 26.R.E. Wells. "Specification and Implementation of a Verifiable Communications System", Master's Thesis, The University of Texas at Austin, December, 1976.Google ScholarGoogle Scholar

Index Terms

  1. A Report On The Development Of Gypsy

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader