At 11:56 AM -0700 4/22/04, Jim & Mary Ronback wrote:

>Safety critical sofware has a lot of overlap with the requirements for high security 
>software.

Can anyone think of any _differences_ between those domain (process and
code-wise, not regulatory-wise).

>For Spark see http://www.praxis-cs.co.uk/sparkada/
>
>They also have an interesting list of security/ integrity related cases where Spark 
>has been used, e.g., the security modules for the SmartCard (system using a credit 
>card with an embedded chip)
>
>http://www.praxis-cs.co.uk/sparkada/publications.asp


Reply via email to