Survivability represents a systems capability to withstand malicious attacks and system failures in order to provide essential services to users even in a challenging environment. in a proof that the system satisfies the users requirements. in a proof-carrying paradigm, a user publishes his/her survivability requirement policy and a system provider contructs a proof that the system satisfies the users requirements. finally, the user verifies if the proff is valid. in this paper, we discuss proof approaches and techniques used by the provider to automatically compile such a proof. we develop algorithms to show how different proof choices are generated so that the system provider can choose the most cost-efficient approach in the proof process. proof generation relies on the certifications generated by trusted evaluators. we show the necessary steps to contruct the basic proof elements which can be logically linked to form the ultimate proof.