At 11:56 AM -0700 4/22/04, Jim & Mary Ronback wrote: >Safety critical sofware has a lot of overlap with the requirements for high security >software.
Can anyone think of any _differences_ between those domain (process and code-wise, not regulatory-wise). >For Spark see http://www.praxis-cs.co.uk/sparkada/ > >They also have an interesting list of security/ integrity related cases where Spark >has been used, e.g., the security modules for the SmartCard (system using a credit >card with an embedded chip) > >http://www.praxis-cs.co.uk/sparkada/publications.asp