Donald McKenzie has provided a time-line for the development of ideas around trust and proof in computing [MacKenzie1998: Appendix].
These notes build on the McKenzie time-line to form a chronology for trustworthy computing.
-- Dennis E. Hamilton
2002 February 2
Last updated 2002-02-03-17:44 -0800 (pdt)
Here we might consider the activities in the 19th and early 20th century, culminating in the work of Gödel and Turing. The chronology in Advent of the Algorithm might be appropriate here.
I am using decades as arbitrary boundaries, though there are enough interesting patterns to practically claim a fit.
1955/56 Newell, Shaw, Simon: Logic Theory Machine
1959 Herbert Gelernter: Geometry Machine
1960 Hao Wang champions algorithmic against heuristic theorem provers
1962 John McCarthy: "Towards a Mathematical Science of Computation"
1963 Alan Robinson: Resolution, a machine-oriented inference rule
1966 Peter Naur: "Proof of Algorithms by General Snapshots"
1967 R.W. Floyd: "Assigning Meanings to Programs"
1967 First public discussion of computer security vulnerabilities of US defence systems
1968 NATO conference on Software Engineering at Garmisch: diagnosis of "software crisis"
1969 C. A. R. Hoare: "An Axiomatic Basis for Computer Programming"
1971 Robert Boyer and J. Strother Moore begin collaboration that leads to their theorem prover
1973-80 SRI PSOS project. Provably Secure Operating System
1976 Appel and Haken prove four-colour conjecture, using 1200 hours computer time
1978-87 SRI proof work on SIFT fault-tolerant avionics computer
1979 DeMillo, Lipton and Perlis attack program proof in Communications of the ACM
1983 "Orange Book." Design proof required for A1 secure systems
1983 SIFT Peer Review
1984-85 VIPER proof effort begins at Royal Signals and Radar Establishment
1985 Honeywell Secure Communications Processor: first system to achieve A1 rating.
1986-90 Disputes over Trip Computer Software delay licensing of Darlington, Ontario, nuclear power station
1986 First clear-cut software error deaths: overdoses from Therac-25 radiation therapy machines
1987 Inmos T800 transputer: floating-point unit microcode formally verified
1987-88 Commercialisation of VIPER begins
1988-89 Entry into service of Airbus A320, first fly-by-wire airliner
1988 Crash of A320 at Habsheim air show triggers fierce controversy in France
1988 James Fetzer attacks program proof in Communications of the ACM
1989 Formally verified SACEM train protection software enters service on RER, Paris
1991 UK Interim Defence Standard 00-55: proof required for systems most critical to safety
1991 VIPER law suit
1994 Hackers seize control of computer network at USAF Rome (N.Y.) Lab
1994 Pentium divide bug
1995 Entry into service of Boeing 777, most computer-intensive airliner to date
1996 New computer-assisted proof of four-colour theorem by Robertson et al.
created 2002-02-02-23:23 -0800 (pst) by orcmid
$$Author: Orcmid $
$$Date: 02-10-13 13:22 $
$$Revision: 6 $