John A. McDermid

According to our database1, John A. McDermid authored at least 120 papers between 1987 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Rapid Integration of CPS Security and Safety.
IEEE Embed. Syst. Lett., 2019

2017
SECT-AIR: Software Engineering Costs and Timescales - Aerospace Initiative for Reduction.
Proceedings of the Software Technologies: Applications and Foundations, 2017

2015
Safety and Dependability.
Proceedings of the Dependable Software Systems Engineering, 2015

The Need for a Confidence View of CPS Support Environments (Fast Abstract).
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Education and training challenges in the era of Cyber-Physical Systems: beyond traditional engineering.
Proceedings of the Workshop on Embedded and Cyber-Physical Systems Education, 2015

2014
Nothing is Certain but Doubt and Tests.
CoRR, 2014

2013
Trusted Product Lines.
Inf. Softw. Technol., 2013

2012
Formal Specification-Based Inspection for Verification of Programs.
IEEE Trans. Software Eng., 2012

Large-scale complex IT systems.
Commun. ACM, 2012

The Risks of LSCITS: The Odds Are Stacked against Us.
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012

2011
Towards Cost-Effective High-Assurance Software Product Lines: The Need for Property-Preserving Transformations.
Proceedings of the Software Product Lines - 15th International Conference, 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Model-based Failure Failure Analysis of Business Process.
Proceedings of the ICEIS 2011, 2011

Failures of a Business Process in Enterprise Systems.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

Product-Line Models to Address Requirements Uncertainty, Volatility and Risk.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
A Rigorous Method for Inspection of Model-Based Formal Specifications.
IEEE Trans. Reliab., 2010

Analysing System Failure Behaviours with PRISM.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

An Overview of the SoBP for Software in the Context of DS 00-56 Issue 4.
Proceedings of the Making Systems Safer, 2010

Development of High-Integrity Software Product Lines Using Model Transformation.
Proceedings of the Computer Safety, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

An Iterative Approach for Development of Safety-Critical Software and Safety Arguments.
Proceedings of the 2010 Agile Conference, 2010

2009
Defence Standard 00-56 Issue 4: Towards Evidence-Based Safety Standards.
Proceedings of the Safety-Critical Systems: Problems, Process and Practice, 2009

Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control.
Proceedings of the Computer Safety, 2009

Probabilistic Failure Propagation and Transformation Analysis.
Proceedings of the Computer Safety, 2009

Domain analysis on an electronic health records system.
Proceedings of the First International Workshop on Feature-Oriented Software Development, 2009

2007
Integrating safety and formal analyses using UML and PFS.
Reliab. Eng. Syst. Saf., 2007

The Art and Science of Software Architecture.
Int. J. Cooperative Inf. Syst., 2007

Using Model Checking to Validate Style-Specific Architectural Refactoring Patterns.
Proceedings of the 31st Annual IEEE / NASA Software Engineering Workshop (SEW-31 2007), 2007

2006
Refactoring service-based systems: how to avoid trusting a workflow service.
Concurr. Comput. Pract. Exp., 2006

Using Simulation to Validate Style-Specific Architectural Refactoring Patterns.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006

Three Perspectives in Formal Engineering.
Proceedings of the Formal Methods and Software Engineering, 2006

2005
Combining software evidence: arguments and assurance.
ACM SIGSOFT Softw. Eng. Notes, 2005

Deriving architectural flexibility requirements in safety-critical systems.
IEE Proc. Softw., 2005

On the Formal Development of Safety-Critical Software.
Proceedings of the Verified Software: Theories, 2005

High-integrity extreme programming.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

An Automated Approach to Specification-Based Program Inspection.
Proceedings of the Formal Methods and Software Engineering, 2005

2004
Improving certification capability through automatic code generation.
Proceedings of the Building the Information Society, 2004

2003
Establishing timing requirements for control loops in real-time systems.
Microprocess. Microsystems, 2003

Safety Assurance Contracts for Integrated Modular Avionics.
Proceedings of the Safety Critical Systems and Software 2003, 2003

A Contract-based Approach to Designing Safe Systems.
Proceedings of the Safety Critical Systems and Software 2003, 2003

A Behavioural Notion of Subtyping for Object-Oriented Programming in SPARK95.
Proceedings of the Reliable Software Technologies, 2003

2002
Eliciting and Specifying Requirements with Use Cases for Embedded Systems.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Trends in Systems Safety.
Proceedings of the Safety Critical Systems and Software 2002, 2002

A Technique for Managing Complexity of Use Cases for Large Complex Embedded Systems.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

Software Hazard and Safety Analysis.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002

2001
Investigating the effectiveness of object-oriented testing strategies using the mutation method.
Softw. Test. Verification Reliab., 2001

Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure.
Reliab. Eng. Syst. Saf., 2001

A systematic approach to safety case maintenance.
Reliab. Eng. Syst. Saf., 2001

Testing and testing techniques for real-time embedded software systems.
Microprocess. Microsystems, 2001

Use of Modern Processors in Safety-Critical Applications.
Comput. J., 2001

Software Safety: Where's the Evidence?
Proceedings of the Safety Critical Systems and Software 2001, 2001

High Level Failure Analysis for Integrated Modular Avionics.
Proceedings of the Safety Critical Systems and Software 2001, 2001

2000
Automated test-data generation for exception conditions.
Softw. Pract. Exp., 2000

Modelling Engineering Design Processes with Role Activity Diagrams.
Trans. SDPS, 2000

Deriving Quantified Safety Requirements in Complex Systems.
Proceedings of the Computer Safety, 2000

Extending Commonality Analysis for Embedded Control System Families.
Proceedings of the Software Architectures for Product Families, 2000

Complexity: Concept, Causes and Control.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000

Generating evidence for certification of modern processors for use in safety-critical systems.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

(True) Polymorphism in SPARK2000.
Proceedings of the Reliable Software Technologies, 2000

1999
Software engineering research: A critical appraisal.
IEE Proc. Softw., 1999

CONVERSE: A change-oriented process for engine controllers.
IEE Proc. Softw., 1999

Hierarchically Performed Hazard Origin and Propagation Studies.
Proceedings of the Computer Safety, 1999

1998
A practical language and toolkit for high-integrity tools.
J. Syst. Softw., 1998

The Cost of COTS (Interview).
Computer, 1998

An Automated Framework for Structural Test-Data Generation.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

1997
Ten Steps Towards Systematic Requirements Reuse.
Requir. Eng., 1997

A Summary of Domain Analysis Experience by Way of Heuristics.
Proceedings of the 1997 ACM SIGSOFT Symposium on Symposium on Software Reusability, 1997

Computer Based Support for Standards and Processes in Safety Critical Systems.
Proceedings of the 16th International Conference on Computer Safety, 1997

A systematic approach to software safety integrity levels.
Proceedings of the 16th International Conference on Computer Safety, 1997

Safety Case Construction and Reuse Using Patterns.
Proceedings of the 16th International Conference on Computer Safety, 1997

1996
A Model for a Causal Logic for Requirements Engineering.
Requir. Eng., 1996

A Model-Oriented Approach to Safety Analysis Using Fault Trees and a Support System.
J. Syst. Softw., 1996

Software Hazard and Safety Analysis: Opportunities and Challenges.
Proceedings of the Safety-Critical Systems: The Convergence of High Tech and Human Factors, 1996

Assessing Complex Computer Based Systems using the Goal Structuring Notation.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

Towards a Fixed Priority Scheduler for an Aircraft Application.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

The Safety Argument Manager: An Integrated Approach to the Engineering and Safety Assessment of Computer Based Systems.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996

A Case Study Using SAM - Safety Analysis of PES.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996

1995
CADiZ: An Architecture for Z Tools and its Implementation.
Softw. Pract. Exp., 1995

High integrity software development: process and tool issues.
Microprocess. Microsystems, 1995

Integrated Analysis of Complex Safety Critical Systems.
Comput. J., 1995

Accessible Formal Method Support for PLC Software Development.
Proceedings of the 14th International Conference on Computer Safety, 1995

Safety Cases for Software Application Reuse.
Proceedings of the 14th International Conference on Computer Safety, 1995

Requirements Analysis and Safety: A Case Study (using GRASP).
Proceedings of the 14th International Conference on Computer Safety, 1995

Integrating requirements analysis and safety analysis.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

A Framework for Requirements Analysis Using Automated Reasoning
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995

1994
Real-time safety-critical systems: analysis and synthesis.
Softw. Eng. J., 1994

Towards a Z Method: Axiomatic Specification in Z.
Proceedings of the Z User Workshop, Cambridge, UK, 29-30 June 1994, Proceedings, 1994

On analysis of secure information systems: a case study.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994

Tool Support for High Integrity Ada Software.
Proceedings of the Ada in Europe, First International Eurospace, 1994

1993
An integrated tool set for software safety analysis.
J. Syst. Softw., 1993

Specifying temporal requirements for distributed real-time systems in Z.
Softw. Eng. J., 1993

Software fault trees and weakest preconditions: a comparison and analysis.
Softw. Eng. J., 1993

Constructing Secure Distributed Systems Using Components.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Dynamic Sets and Their Application in VDM.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

I never knew my requirements were object-oriented until I talked to my analyst.
Proceedings of IEEE International Symposium on Requirements Engineering, 1993

Investigating and Formalising the Development of HIS Within PSEEs.
Proceedings of the State of the Practice in Process Technology, 1993

Applying noninterference to composition of systems: a more practical approach.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Learning from IPSE's Mistakes.
IEEE Softw., 1992

On the Meaning of Safety and Security.
Comput. J., 1992

Formal Methods: Use and Relevance for the Development of Safety-Critical Systems.
Comput. J., 1992

Using Diagrams to Give a Formal Specification of Timing Constraints in Z.
Proceedings of the Z User Workshop, London, UK, 14-15 December 1992, Proceedings, 1992

What is the Right Specification/Design/Implementation Paradigm for Real-Time Applications?
Proceedings of the Real Time Computing, 1992

Safety Engineering and Assurance for Real-Time Systems.
Proceedings of the Real Time Computing, 1992

"Birds-of-a-Feather-Group" on Safety Critical Systems.
Proceedings of the Real Time Computing, 1992

Incremental processing of Z specifications.
Proceedings of the Formal Description Techniques, 1992

Formalizing and Validating Complex Security Requirements.
Proceedings of the Database Security, 1992

Secure composition of systems.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Safety arguments, software and system reliability.
Proceedings of the Second International Symposium on Software Reliability Engineering, 1991

The Structure of Permissions: A Normative Framework for Access Rights.
Proceedings of the Database Security, 1991

A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
An Approach to Object-Oriented Specification Using Z.
Proceedings of the Z User Workshop, 1990

CADIZ - Computer Aided Design in Z.
Proceedings of the Z User Workshop, 1990

A Tool for Defining the Architecture of Z Specifications.
Proceedings of the Z User Workshop, 1990

Towards an Object Oriented Development Environment for Secure Applications.
Proceedings of the ESORICS 90, 1990

1989
A Framework for Expressing Models of Security Policy.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Security Policies for Integrated Project Support Environments.
Proceedings of the Database Security, 1989

1988
Low Level Synchronisation Problems in Digital Systems.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

Security Models and Enterprise Models.
Proceedings of the Database Security, 1988

1987
Implementation of a model lift control system from a formal specification.
Softw. Eng. J., 1987


  Loading...