Author of the publication

Secure Ada Target: Issues, System Design, and Verification.

, , , and . S&P, page 176-183. IEEE Computer Society, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steelman and the verifiability of (preliminary) ADA., and . ACM SIGPLAN Notices, 16 (2): 113-119 (1981)Mathematical Modeling and Analysis of an External Memory Manager., and . FME, volume 1313 of Lecture Notes in Computer Science, page 237-257. Springer, (1997)Generics and verification in Ada., and . SIGPLAN, page 123-127. ACM, (1980)Toward Verified Execution Environments., , and . S&P, page 106-115. IEEE Computer Society, (1987)Toward the Verification of a Simple Hypervisor, , , , and . ACL2, volume 70 of EPTCS, page 28-45. (2011)Formal Methods versus Software Engineering: Is There a Conflict?. Symposium on Testing, Analysis, and Verification, page 188-189. ACM, (1991)A preliminary evaluation of verifiability in Ada., , and . ACM Annual Conference, page 218-224. ACM, (1980)A State-Based Approach to Non-Interference., and . CSFW, page 11-21. IEEE Computer Society, (1994)Verified program support environments.. Formal Methods in Software Development, page 147-149. ACM, (1990)Introduction to a Formally Defined Hardware Description Language., , and . TPCD, volume A-10 of IFIP Transactions, page 3-35. North-Holland, (1992)