John A. McDermid

Orcid: 0000-0003-4745-4272

Affiliations:
  • University of York, Department of Computer Science, UK


According to our database1, John A. McDermid authored at least 174 papers between 1981 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Safety of Autonomy: A Systematic Approach.
Computer, April, 2024

Context-Aware Graceful Degradation for Mixed-Criticality Scheduling in Autonomous Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

Safety Analysis of Autonomous Railway Systems: An Introduction to the SACRED Methodology.
CoRR, 2024

What's my role? Modelling responsibility for AI-based safety-critical systems.
CoRR, 2024

2023
reTSN: Resilient and Efficient Time-Sensitive Network for Automotive In-Vehicle Communication.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2023

Unravelling Responsibility for AI.
CoRR, 2023

Safety engineering, role responsibility and lessons from the Uber ATG Tempe Accident.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

The Need for the Human-Centred Explanation for ML-based Clinical Decision Support Systems.
Proceedings of the 11th IEEE International Conference on Healthcare Informatics, 2023

Graceful Degradation with Condition- and Inference-Awareness for Mixed-Criticality Scheduling in Autonomous Systems.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

2022
Distinguishing two features of accountability for AI technologies.
Nat. Mac. Intell., September, 2022

The Role of Explainability in Assuring Safety of Machine Learning in Healthcare.
IEEE Trans. Emerg. Top. Comput., 2022

Safety Assessment for Autonomous Systems' Perception Capabilities.
CoRR, 2022

Guidance on the Safety Assurance of Autonomous Systems in Complex Environments (SACE).
CoRR, 2022

A Principle-based Ethical Assurance Argument for AI and Autonomous Systems.
CoRR, 2022

Analysing the Safety of Decision-Making in Autonomous Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2022

Investigating Human Error Within GoA-2 Metro Lines.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2022

2021
Safety-driven design of machine learning for sepsis treatment.
J. Biomed. Informatics, 2021

A Framework for Assurance of Medication Safety using Machine Learning.
CoRR, 2021

Safety, Complexity, and Automated Driving: Holistic Perspectives on Safety Assurance.
Computer, 2021

Enhancing the Value of Counterfactual Explanations for Deep Learning.
Proceedings of the Artificial Intelligence in Medicine, 2021

2020
An enhanced vehicle control model for assessing highly automated driving safety.
Reliab. Eng. Syst. Saf., 2020

Enhancing Covid-19 Decision-Making by Creating an Assurance Case for Simulation Models.
CoRR, 2020

The Association for the Advancement of Artificial Intelligence 2020 Workshop Program.
AI Mag., 2020

Mind the gaps: Assuring the safety of autonomous systems from an engineering, ethical, and legal perspective.
Artif. Intell., 2020

Safety of Artificial Intelligence: A Collaborative Model.
Proceedings of the Workshop on Artificial Intelligence Safety 2020 co-located with the 29th International Joint Conference on Artificial Intelligence and the 17th Pacific Rim International Conference on Artificial Intelligence (IJCAI-PRICAI 2020), 2020

2019
Rapid Integration of CPS Security and Safety.
IEEE Embed. Syst. Lett., 2019

A SysML Profile for Fault Trees - Linking Safety Models to System Design.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Integrating Existing Safety Analyses into SysML.
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019

Towards a Framework for Safety Assurance of Autonomous Systems.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the 28th International Joint Conference on Artificial Intelligence, 2019

2017
Why functional safety experts worry about automotive systems having increasing autonomy.
Proceedings of the 2017 IEEE SmartWorld, 2017

SECT-AIR: Software Engineering Costs and Timescales - Aerospace Initiative for Reduction.
Proceedings of the Software Technologies: Applications and Foundations, 2017

2016
Testing Method for Multi-UAV Conflict Resolution Using Agent-Based Simulation and Multi-Objective Search.
J. Aerosp. Inf. Syst., 2016

On the Validation of a UAV Collision Avoidance System Developed by Model-Based Optimization: Challenges and a Tentative Partial Solution.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
Safety and Dependability.
Proceedings of the Dependable Software Systems Engineering, 2015

Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logic.
Proceedings of the Computer Safety, Reliability, and Security, 2015

The Need for a Confidence View of CPS Support Environments (Fast Abstract).
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Education and training challenges in the era of Cyber-Physical Systems: beyond traditional engineering.
Proceedings of the Workshop on Embedded and Cyber-Physical Systems Education, 2015

2014
Fixing the cracks in the crystal ball: A maturity model for quantitative risk assessment.
Reliab. Eng. Syst. Saf., 2014

Nothing is Certain but Doubt and Tests.
CoRR, 2014

Safety Validation of Sense and Avoid Algorithms Using Simulation and Evolutionary Search.
Proceedings of the Computer Safety, Reliability, and Security, 2014

2013
Trusted Product Lines.
Inf. Softw. Technol., 2013

2012
Formal Specification-Based Inspection for Verification of Programs.
IEEE Trans. Software Eng., 2012

Large-scale complex IT systems.
Commun. ACM, 2012

Goal-Based Safety Standards: Promises and Pitfalls.
Proceedings of the Achieving Systems Safety, 2012

The Risks of LSCITS: The Odds Are Stacked against Us.
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012

2011
Towards Cost-Effective High-Assurance Software Product Lines: The Need for Property-Preserving Transformations.
Proceedings of the Software Product Lines - 15th International Conference, 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Model-based Failure Failure Analysis of Business Process.
Proceedings of the ICEIS 2011, 2011

Failures of a Business Process in Enterprise Systems.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

Product-Line Models to Address Requirements Uncertainty, Volatility and Risk.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
A Rigorous Method for Inspection of Model-Based Formal Specifications.
IEEE Trans. Reliab., 2010

Analysing System Failure Behaviours with PRISM.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

An Overview of the SoBP for Software in the Context of DS 00-56 Issue 4.
Proceedings of the Making Systems Safer, 2010

Development of High-Integrity Software Product Lines Using Model Transformation.
Proceedings of the Computer Safety, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

An Iterative Approach for Development of Safety-Critical Software and Safety Arguments.
Proceedings of the 2010 Agile Conference, 2010

2009
Defence Standard 00-56 Issue 4: Towards Evidence-Based Safety Standards.
Proceedings of the Safety-Critical Systems: Problems, Process and Practice, 2009

Professional Issues in System Safety Engineering.
Proceedings of the Safety-Critical Systems: Problems, Process and Practice, 2009

Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control.
Proceedings of the Computer Safety, 2009

Probabilistic Failure Propagation and Transformation Analysis.
Proceedings of the Computer Safety, 2009

Domain analysis on an electronic health records system.
Proceedings of the First International Workshop on Feature-Oriented Software Development, 2009

2007
Integrating safety and formal analyses using UML and PFS.
Reliab. Eng. Syst. Saf., 2007

The Art and Science of Software Architecture.
Int. J. Cooperative Inf. Syst., 2007

Using Model Checking to Validate Style-Specific Architectural Refactoring Patterns.
Proceedings of the 31st Annual IEEE / NASA Software Engineering Workshop (SEW-31 2007), 2007

2006
Refactoring service-based systems: how to avoid trusting a workflow service.
Concurr. Comput. Pract. Exp., 2006

Using Simulation to Validate Style-Specific Architectural Refactoring Patterns.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006

Three Perspectives in Formal Engineering.
Proceedings of the Formal Methods and Software Engineering, 2006

2005
Combining software evidence: arguments and assurance.
ACM SIGSOFT Softw. Eng. Notes, 2005

Deriving architectural flexibility requirements in safety-critical systems.
IEE Proc. Softw., 2005

On the Formal Development of Safety-Critical Software.
Proceedings of the Verified Software: Theories, 2005

High-integrity extreme programming.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Two-stage visual localisation: landmark-based pose initialisation and model-based pose refinement.
Proceedings of the 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005

An Automated Approach to Specification-Based Program Inspection.
Proceedings of the Formal Methods and Software Engineering, 2005

2004
The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation.
Proceedings of the Safety Critical Systems and Software 2004, 2004

Improving certification capability through automatic code generation.
Proceedings of the Building the Information Society, 2004

Plane Segmentation from Two Views in Reciprocal-Polar Image Space.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

2003
Establishing timing requirements for control loops in real-time systems.
Microprocess. Microsystems, 2003

Safety Assurance Contracts for Integrated Modular Avionics.
Proceedings of the Safety Critical Systems and Software 2003, 2003

A Contract-based Approach to Designing Safe Systems.
Proceedings of the Safety Critical Systems and Software 2003, 2003

Epipole Estimation under Pure Camera Translation.
Proceedings of the Seventh International Conference on Digital Image Computing: Techniques and Applications, 2003

A Behavioural Notion of Subtyping for Object-Oriented Programming in SPARK95.
Proceedings of the Reliable Software Technologies, 2003

2002
Eliciting and Specifying Requirements with Use Cases for Embedded Systems.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Trends in Systems Safety.
Proceedings of the Safety Critical Systems and Software 2002, 2002

A Technique for Managing Complexity of Use Cases for Large Complex Embedded Systems.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

Software Hazard and Safety Analysis.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002

2001
Investigating the effectiveness of object-oriented testing strategies using the mutation method.
Softw. Test. Verification Reliab., 2001

Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure.
Reliab. Eng. Syst. Saf., 2001

A systematic approach to safety case maintenance.
Reliab. Eng. Syst. Saf., 2001

Testing and testing techniques for real-time embedded software systems.
Microprocess. Microsystems, 2001

Use of Modern Processors in Safety-Critical Applications.
Comput. J., 2001

Software Safety: Where's the Evidence?
Proceedings of the Safety Critical Systems and Software 2001, 2001

High Level Failure Analysis for Integrated Modular Avionics.
Proceedings of the Safety Critical Systems and Software 2001, 2001

A Family-Oriented Software Development Process for Engine Controllers.
Proceedings of the Product Focused Software Process Improvement, 2001

2000
Automated test-data generation for exception conditions.
Softw. Pract. Exp., 2000

Modelling Engineering Design Processes with Role Activity Diagrams.
Trans. SDPS, 2000

Deriving Quantified Safety Requirements in Complex Systems.
Proceedings of the Computer Safety, 2000

Extending Commonality Analysis for Embedded Control System Families.
Proceedings of the Software Architectures for Product Families, 2000

Complexity: Concept, Causes and Control.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000

Generating evidence for certification of modern processors for use in safety-critical systems.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

(True) Polymorphism in SPARK2000.
Proceedings of the Reliable Software Technologies, 2000

1999
Software engineering research: A critical appraisal.
IEE Proc. Softw., 1999

CONVERSE: A change-oriented process for engine controllers.
IEE Proc. Softw., 1999

Hierarchically Performed Hazard Origin and Propagation Studies.
Proceedings of the Computer Safety, 1999

1998
A harmonised model for safety assessment and certification of safety-critical systems in the transportation industries.
Requir. Eng., 1998

A practical language and toolkit for high-integrity tools.
J. Syst. Softw., 1998

The Cost of COTS (Interview).
Computer, 1998

COTS in Safety-Related Systems Issues and an Illustration.
Proceedings of the Industrial Perspectives of Safety-critical Systems, 1998

An Automated Framework for Structural Test-Data Generation.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1997
Ten Steps Towards Systematic Requirements Reuse.
Requir. Eng., 1997

A Summary of Domain Analysis Experience by Way of Heuristics.
Proceedings of the 1997 ACM SIGSOFT Symposium on Symposium on Software Reusability, 1997

Computer Based Support for Standards and Processes in Safety Critical Systems.
Proceedings of the 16th International Conference on Computer Safety, 1997

A systematic approach to software safety integrity levels.
Proceedings of the 16th International Conference on Computer Safety, 1997

Safety Case Construction and Reuse Using Patterns.
Proceedings of the 16th International Conference on Computer Safety, 1997

1996
A Model for a Causal Logic for Requirements Engineering.
Requir. Eng., 1996

A Model-Oriented Approach to Safety Analysis Using Fault Trees and a Support System.
J. Syst. Softw., 1996

Managing analytical complexity of safety critical systems using viewpoints.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

Software Hazard and Safety Analysis: Opportunities and Challenges.
Proceedings of the Safety-Critical Systems: The Convergence of High Tech and Human Factors, 1996

Assessing Complex Computer Based Systems using the Goal Structuring Notation.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

Towards a Fixed Priority Scheduler for an Aircraft Application.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

The Safety Argument Manager: An Integrated Approach to the Engineering and Safety Assessment of Computer Based Systems.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996

An Integrated Approach to Domain Analysis and Reuse for Engineering Complex Systems.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996

A Case Study Using SAM - Safety Analysis of PES.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996

1995
CADiZ: An Architecture for Z Tools and its Implementation.
Softw. Pract. Exp., 1995

High integrity software development: process and tool issues.
Microprocess. Microsystems, 1995

Software Engineering: A Practitioner's Approach [Book Review].
Softw. Eng. J., 1995

Integrated Analysis of Complex Safety Critical Systems.
Comput. J., 1995

Accessible Formal Method Support for PLC Software Development.
Proceedings of the 14th International Conference on Computer Safety, 1995

Safety Cases for Software Application Reuse.
Proceedings of the 14th International Conference on Computer Safety, 1995

Requirements Analysis and Safety: A Case Study (using GRASP).
Proceedings of the 14th International Conference on Computer Safety, 1995

Integrating requirements analysis and safety analysis.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

A Framework for Requirements Analysis Using Automated Reasoning
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995

1994
Real-time safety-critical systems: analysis and synthesis.
Softw. Eng. J., 1994

Towards a Z Method: Axiomatic Specification in Z.
Proceedings of the Z User Workshop, Cambridge, UK, 29-30 June 1994, Proceedings, 1994

On analysis of secure information systems: a case study.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994

Tool Support for High Integrity Ada Software.
Proceedings of the Ada in Europe, First International Eurospace, 1994

1993
An integrated tool set for software safety analysis.
J. Syst. Softw., 1993

Towards Operational Measures of Computer Security.
J. Comput. Secur., 1993

Specifying temporal requirements for distributed real-time systems in Z.
Softw. Eng. J., 1993

Software fault trees and weakest preconditions: a comparison and analysis.
Softw. Eng. J., 1993

Constructing Secure Distributed Systems Using Components.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Dynamic Sets and Their Application in VDM.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

Investigating and Formalising the Development of HIS Within PSEEs.
Proceedings of the State of the Practice in Process Technology, 1993

Applying noninterference to composition of systems: a more practical approach.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Learning from IPSE's Mistakes.
IEEE Softw., 1992

On the Meaning of Safety and Security.
Comput. J., 1992

Formal Methods: Use and Relevance for the Development of Safety-Critical Systems.
Comput. J., 1992

Using Diagrams to Give a Formal Specification of Timing Constraints in Z.
Proceedings of the Z User Workshop, London, UK, 14-15 December 1992, Proceedings, 1992

What is the Right Specification/Design/Implementation Paradigm for Real-Time Applications?
Proceedings of the Real Time Computing, 1992

Safety Engineering and Assurance for Real-Time Systems.
Proceedings of the Real Time Computing, 1992

"Birds-of-a-Feather-Group" on Safety Critical Systems.
Proceedings of the Real Time Computing, 1992

Formal Methods for Real-Time Systems.
Proceedings of the Real Time Computing, 1992

Incremental processing of Z specifications.
Proceedings of the Formal Description Techniques, 1992

Formalizing and Validating Complex Security Requirements.
Proceedings of the Database Security, 1992

Secure composition of systems.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Safety arguments, software and system reliability.
Proceedings of the Second International Symposium on Software Reliability Engineering, 1991

The Structure of Permissions: A Normative Framework for Access Rights.
Proceedings of the Database Security, 1991

A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
An Approach to Object-Oriented Specification Using Z.
Proceedings of the Z User Workshop, 1990

CADIZ - Computer Aided Design in Z.
Proceedings of the Z User Workshop, 1990

A Tool for Defining the Architecture of Z Specifications.
Proceedings of the Z User Workshop, 1990

Towards an Object Oriented Development Environment for Secure Applications.
Proceedings of the ESORICS 90, 1990

1989
A Framework for Expressing Models of Security Policy.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Security Policies for Integrated Project Support Environments.
Proceedings of the Database Security, 1989

1988
Low Level Synchronisation Problems in Digital Systems.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

Security Models and Enterprise Models.
Proceedings of the Database Security, 1988

1987
The Role of Formal Methods in Software Development.
J. Inf. Technol., 1987

Implementation of a model lift control system from a formal specification.
Softw. Eng. J., 1987

1986
Editorial: Mascot 3.
Softw. Eng. J., 1986

Software metrics and integrated project support environments.
Softw. Eng. J., 1986

1985
The IEE and software engineers.
Softw. Microsystems, 1985

Editorial.
Softw. Microsystems, 1985

1981
Checkpointing and Error Recovery in distributed Systems.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981


  Loading...