Event B
This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework o...
Saved in:
| Published in: | Formal Methods Applied to Complex Systems: Implementation of the B Method pp. 253 - 298 |
|---|---|
| Main Authors: | , |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Hoboken, NJ, USA
John Wiley & Sons, Inc
26.06.2014
|
| Subjects: | |
| ISBN: | 1848217099, 9781848217096 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework of a transition system, which may model a program, an algorithm or a distributed system. It details the Event B language and related concepts such as events, contexts, machines and refinement. The chapter explains proof obligations (POs) generated for checking the consistency of the Event B structure. It develops three case studies, in order to illustrate the incremental and proof‐based modeling using Event B. The chapter emphasizes the notion of proof‐based patterns applied for the Event B method. It describes available tools for supporting the Event B modeling language concludes with the current and future trends for this method. |
|---|---|
| AbstractList | This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework of a transition system, which may model a program, an algorithm or a distributed system. It details the Event B language and related concepts such as events, contexts, machines and refinement. The chapter explains proof obligations (POs) generated for checking the consistency of the Event B structure. It develops three case studies, in order to illustrate the incremental and proof‐based modeling using Event B. The chapter emphasizes the notion of proof‐based patterns applied for the Event B method. It describes available tools for supporting the Event B modeling language concludes with the current and future trends for this method. |
| Author | Singh, Neeraj Kumar Méry, Dominique |
| Author_xml | – sequence: 1 givenname: Dominique surname: Méry fullname: Méry, Dominique – sequence: 2 givenname: Neeraj Kumar surname: Singh fullname: Singh, Neeraj Kumar |
| BookMark | eNptj8FKA0EMhkdU1Na-gCdfYNcks7OTOWppbaHQSz0POzsZulh2CyuKPr1bK0LBS5I_5At8I3XRdq0odYeQIwA9OMuI6IbRks3rLcKZGv1t3PkQuGBCC85dq0nfNwGIAIFKvlFXs3dp3-6fbtVlqna9TH77WL3MZ5vpIlutn5fTx1W2RbYpMxpIJ2tqFo4YmZGjLWuqwRUaqsIKoSZw7EoJSUptHFdsJOpgUCDosdLHvx_NTj69hK577T2CP7j4Exd_cPkpA5X_Q51efzX7I7GPSX8DThlKeA |
| ContentType | Book Chapter |
| Copyright | Copyright © 2014 John Wiley & Sons, Inc. |
| Copyright_xml | – notice: Copyright © 2014 John Wiley & Sons, Inc. |
| DOI | 10.1002/9781119002727.ch10 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1119002729 9781119002727 |
| Editor | Boulanger, Jean‐Louis |
| Editor_xml | – sequence: 1 givenname: Jean‐Louis surname: Boulanger fullname: Boulanger, Jean‐Louis |
| EndPage | 298 |
| ExternalDocumentID | 10.1002/9781119002727.ch10 |
| Genre | chapter |
| GroupedDBID | 20A 38. 3XM AABBV AAPZQ AARDG ABARN ABBFG ABIAV ABQPQ ABQPW ACGYG ACLGV ACNUM ADVEM AERYV AFLZI AFOJC AHWGJ AJFER AKHYG AKQZE ALMA_UNASSIGNED_HOLDINGS ASVIU AZZ BBABE CZZ GEOUK IEZ IPJKO JFSCD JJU JP0 KJBCJ LPRNP LQKAK LWYJN LYPXV MYL OHSWP OTAXI PQQKQ UZ6 W1A YPLAZ ZEEST |
| ID | FETCH-LOGICAL-h187f-53023f75c8e8d1d8818d76c2c09430a47e213209896ebfe63598a85ed3b51e0b3 |
| ISBN | 1848217099 9781848217096 |
| IngestDate | Sat Nov 15 22:25:38 EST 2025 Wed Nov 27 04:54:49 EST 2019 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-h187f-53023f75c8e8d1d8818d76c2c09430a47e213209896ebfe63598a85ed3b51e0b3 |
| PageCount | 46 |
| ParticipantIDs | wiley_ebooks_10_1002_9781119002727_ch10_ch10 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-06-26 |
| PublicationDateYYYYMMDD | 2014-06-26 |
| PublicationDate_xml | – month: 06 year: 2014 text: 2014-06-26 day: 26 |
| PublicationDecade | 2010 |
| PublicationPlace | Hoboken, NJ, USA |
| PublicationPlace_xml | – name: Hoboken, NJ, USA |
| PublicationTitle | Formal Methods Applied to Complex Systems: Implementation of the B Method |
| PublicationYear | 2014 |
| Publisher | John Wiley & Sons, Inc |
| Publisher_xml | – name: John Wiley & Sons, Inc |
| References | Benaissa, Méry (cit15) 2009 Abrial (cit1) 1996 Mosbah (cit63) 2014 Méry, Singh (cit58) 2011 Clearsy (cit29) 2010 Clarke, Grunberg, Peled (cit26) 2000 cit36 Rehm (cit64) 2009; I Chandy, Misra (cit25) 1988 Méry (cit46) 2009; 3 Singh (cit66) 2013 Méry, Singh (cit54) 2011 Dijkstra (cit34) 1976 Cousot, Cousot (cit31) 1979 Lamport (cit43) 2002 Abrial (cit6) 2010 Méry (cit45) 2009; 41 Benaissa, Cansell, Mery (cit11) 2007 Mcmillan (cit44) 1993 Holzmann (cit40) 1997; 16 Benaissa (cit12) 2008; 5238 Back (cit8) 1979; 23 Clearsy, Aix‐en‐Provence (F), Atelier (cit27) 2002 Clearsy (cit28) 2004 Cousot (cit33) 2000; 19 Méry, Singh (cit57) 2011; 7 Méry, Mosbah, Tounsi (cit48) 2010 (cit21) 2007 Cansell, Méry (cit23) 2007 Lamport (cit41) 1980 Méry, Singh (cit55) 2011 Benaissa (cit16) 2010; I Méry, Singh (cit47) 2009 Abrial, Butler, Hallerstede (cit7) 2010; 12 Bjorner (cit18) 2006 Abrial, Butler, Hallerstede (cit5) 2008; 5238 Singh (cit65) 2011; 1 Bjorner (cit20) 2006 Morgan (cit62) 1990 Abrial, Cansell, Méry (cit2) 2003; 14 Benaissa, Méry (cit17) 2010; 6072 Méry, Singh (cit60) 2011 Abrial, Cansell (cit4) 2003; 2758 Hoang, Kuruma, Basin (cit39) 2009; 74 Cousot, Cousot (cit32) 1992; 2 Méry, Mosbah, Tounsi (cit52) 2011; 6664 Abrial (cit3) 2003; 2805 Hoang, Furst, Abrial (cit38) 2009 Bjorner (cit19) 2006 Méry, Singh (cit49) 2010; 1 Lamport (cit42) 1994; 16 Méry, Singh (cit53) 2011 Cansell, Méry, Rehm (cit24) 2007; 4355 Cansell (cit22) Méry, Singh (cit56) 2011 Back, Kurki‐Suonio (cit9) 1989; 3 Turing (cit67) 1949 Cousot (cit30) 1978; 21 Hoare (cit37) 1969; 12 Méry, Monahan (cit61) 2013; 16 Benaissa, Méry (cit14) 2009 Méry, Singh (cit59) 2011 Méry, Singh (cit51) 2010; 6416 Floyd (cit35) 1967; 19 Back, von Wright (cit10) 1998 Benaissa, Méry (cit13) 2009 Méry, Singh (cit50) 2010 |
| References_xml | – volume: 6072 start-page: 25 year: 2010 end-page: 36 ident: cit17 article-title: Proof‐based design of security protocols publication-title: 5th International Computer Science Symposium in Russia, CSR 2010, Lecture Notes in Computer Science – year: 1976 ident: cit34 article-title: A Discipline of Programming – start-page: 174 year: 1980 end-page: 185 ident: cit41 article-title: Sometime is sometimes not never: a tutorial on the temporal logic of programs publication-title: Proceedings of the Seventh Annual Symposium on Principles of Programming Languages – volume: 6664 start-page: 338 year: 2011 end-page: 352 ident: cit52 article-title: Refinement‐Based Verification of Local Synchronization Algorithms – volume: 14 start-page: 215 issue: 3 year: 2003 end-page: 227 ident: cit2 article-title: A mechanically proved and incremental development of IEEE 1394 tree identify protocol publication-title: Formal Aspects of Computing – volume: 2758 start-page: 1 year: 2003 end-page: 24 ident: cit4 article-title: Click'n prove: interactive proofs within set theory publication-title: TPHOLs, Lecture Notes in Computer Science – volume: 74 start-page: 879 issue: 11–12 year: 2009 end-page: 899 ident: cit39 article-title: Developing topology discovery in Event‐B publication-title: Sci. Comput. Program. – volume: 1 year: 2011 ident: cit65 article-title: Fiabilité et sûreté des systèmes informatiques critiques – year: 2011 ident: cit54 article-title: Analysis of DSR protocol in Event‐B publication-title: 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011) – year: 2011 ident: cit55 article-title: B2C : A Tool for Event‐B to C Conversion Support – volume: 6416 start-page: 312 year: 2010 end-page: 326 ident: cit51 article-title: Trustable formal specification for software certification publication-title: 4th International Symposium On Leveraging Applications of Formal Methods – ISOLA 2010 – year: 1990 ident: cit62 article-title: Programming from Specifications – volume: 2 start-page: 511 issue: 4 year: 1992 end-page: 547 ident: cit32 article-title: Abstract interpretation frameworks publication-title: Journal of Logic and Computation – volume: I year: 2009 ident: cit64 article-title: Gestion du temps par le raffinement – year: 2011 ident: cit56 article-title: Formal development and automatic code generation: cardiac pacemaker publication-title: International Conference on Computers and Advanced Technology in Education (ICCATE 2011) – volume: 5238 start-page: 347 year: 2008 ident: cit5 article-title: A Roadmap for the Rodin Toolset publication-title: ABZ, Lecture Notes in Computer Science – year: 2007 ident: cit21 article-title: Logics of Specification Languages – start-page: 210 year: 2009 end-page: 219 ident: cit38 article-title: Event‐B patterns and their tool support publication-title: SEFM – year: 2004 ident: cit28 article-title: B4FREE – year: 2011 ident: cit59 article-title: A generic framework: from modeling to code publication-title: Fourth IEEE International workshop UML and Formal Methods (UML&FM'2011), (to be appeared in special issue of ISSE NASA Journal, Innovations in Systems and Software Engineering) – volume: 7 start-page: 227 issue: 4 year: 2011 end-page: 235 ident: cit57 article-title: A generic framework: from modeling to code publication-title: ISSE – volume: 16 start-page: 57 year: 2013 end-page: 73 ident: cit61 article-title: Transforming Event B models into verified C# implementations publication-title: VPT@CAV, of EPiC Series – start-page: 269 year: 1979 end-page: 282 ident: cit31 article-title: Systematic design of program analysis frameworks publication-title: Proceedings Records of Sixth Proceedings of the Symposium on Principles of Programming Languages – volume: 16 start-page: 872 issue: 3 year: 1994 end-page: 923 ident: cit42 article-title: A temporal logic of actions publication-title: Transactions On Programming Languages and Systems – year: 2014 ident: cit63 article-title: VISIDIA – volume: 12 start-page: 576 year: 1969 end-page: 580 ident: cit37 article-title: An axiomatic basis for computer programming publication-title: Communications of the Association for Computing Machinery – year: 2000 ident: cit26 article-title: Model Checking – year: 2011 ident: cit58 article-title: Formalisation of the heart based on conduction of electrical impulses and cellular‐automata publication-title: International Symposium on Foundations of Health Information Engineering and Systems (FHIES 2011) – year: 2011 ident: cit53 article-title: EB2C: a tool for Event‐B to C conversion support – year: 1998 ident: cit10 article-title: Refinement Calculus A Systematic Introduction – year: 2006 ident: cit19 article-title: Software Engineering 2 Specification of Systems and Languages – volume: 41 start-page: 51 issue: 2 year: 2009 end-page: 59 ident: cit45 article-title: A simple refinement‐based method for constructing algorithms publication-title: ACM SIGCSE Bulletin – year: 2010 ident: cit50 article-title: Technical report on formal development of two‐electrode cardiac pacing system, Research report – volume: 5238 start-page: 251 year: 2008 end-page: 264 ident: cit12 article-title: Modeling attacker's knowledge for cascade cryptographic protocols publication-title: First International Conference on Abstract State Machines, B and Z – ABZ 2008 – year: 2011 ident: cit60 article-title: Medical protocol diagnosis using formal methods publication-title: International Symposium on Foundations of Health Information Engineering and Systems (FHIES 2011) – year: 1993 ident: cit44 article-title: Symbolic Model Checking – ident: cit36 article-title: The ProB animator and model checker – year: 1988 ident: cit25 article-title: Parallel Program Design A Foundation – start-page: 33 year: 2007 end-page: 140 ident: cit23 article-title: The Event‐B Modeling Method: Concepts and Case Studies – volume: 21 year: 1978 ident: cit30 article-title: Méthodes itératives de construction et d'approximation de points fixes d'opérateurs monotones sur un treillis, analyse sémantique des programmes – volume: 12 start-page: 447 issue: 6 year: 2010 end-page: 466 ident: cit7 article-title: Rodin: an open toolset for modeling and reasoning in Event‐B publication-title: STTT – year: 2009 ident: cit13 article-title: Cryptographic protocols analysis in Event B publication-title: Seventh International Andrei Ershov Memorial Conference “PERSPECTIVES OF SYSTEM INFORMATICS” – PSI 2009 – year: 2006 ident: cit18 article-title: Software Engineering 1 Abstraction and Modeling – volume: 19 start-page: 19 year: 1967 end-page: 32 ident: cit35 article-title: Assigning meanings to programs publication-title: Proc. Symp. Appl. Math. 19, Mathematical Aspects of Computer Science – year: 1996 ident: cit1 article-title: The B book – Assigning Programs to Meanings – ident: cit22 article-title: Click'N'Prove – volume: 23 start-page: 49 issue: 1 year: 1979 end-page: 68 ident: cit8 article-title: On correct refinement of programs publication-title: Journal of Computer and System Sciences – year: 2010 ident: cit6 article-title: Modeling in Event‐B: System and Software Engineering – year: 1949 ident: cit67 article-title: On checking a large routine publication-title: Conference on High‐Speed Automatic Calculating Machines – volume: 2805 start-page: 51 year: 2003 end-page: 74 ident: cit3 article-title: Event based sequential program development: application to constructing a pointer program publication-title: FME, Lecture Notes in Computer Science – year: 2007 ident: cit11 article-title: Integration of security policy into system modeling publication-title: The 7th International B Conference – B2007 – volume: 3 start-page: 197 issue: 2–3 year: 2009 end-page: 239 ident: cit46 article-title: Refinement‐Bbsed guidelines for algorithmic systems publication-title: International Journal of Software and Informatics – year: 2009 ident: cit47 article-title: Pacemaker's functional behaviors in Event‐B – year: 2006 ident: cit20 article-title: Software Engineering 3 Domains, Requirements, and Software Design – volume: 4355 start-page: 140 year: 2007 end-page: 154 ident: cit24 article-title: Time constraint patterns for Event B development publication-title: 7th International Conference of B Users – volume: 3 start-page: 73 issue: 2 year: 1989 end-page: 87 ident: cit9 article-title: Decentralization of process nets with centralized control publication-title: Distributed Computing – volume: 1 year: 2010 ident: cit49 article-title: Functional behavior of a cardiac pacing system publication-title: International Journal of Discrete Event Control Systems (IJDECS) – volume: 19 start-page: 155 issue: 1–2–3 year: 2000 end-page: 164 ident: cit33 article-title: Interprétation abstraite publication-title: Technique et science informatique – year: 2010 ident: cit48 article-title: Proving distributed algorithms by combining refinement and local computations publication-title: AVOCS 2010 10th International Workshop on Automated Verification of Critical Systems – year: 2013 ident: cit66 article-title: Using Event‐B for Critical Device Software Systems – year: 2002 ident: cit43 article-title: Specifying Systems: The TLA+ + Language and Tools for Hardware and Software Engineers – year: 2009 ident: cit14 article-title: Cryptologic protocols analysis using proof‐based patterns publication-title: Seventh International Andrei Ershov Memorial Conference “PERSPECTIVES OF SYSTEM INFORMATICS” – PSI 2009 – year: 2009 ident: cit15 article-title: Développement combiné et prouvé de systèmes transactionnels cryptologiques publication-title: Approches Formelles dans l'Assistance au Développement de Logiciels – AFADL 2009 – volume: I year: 2010 ident: cit16 article-title: La composition des protocoles de sécurité avec la méthode B événementielle – year: 2010 ident: cit29 article-title: BART – volume: 16 start-page: 1512 issue: 5 year: 1997 end-page: 1542 ident: cit40 article-title: The spin model checker publication-title: IEEE Trans. on software engineering – year: 2002 ident: cit27 |
| SSID | ssib022010268 ssib025862898 ssj0001379362 ssib039408759 |
| Score | 1.4446911 |
| Snippet | This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual... |
| SourceID | wiley |
| SourceType | Enrichment Source Publisher |
| StartPage | 253 |
| SubjectTerms | Event B proof obligations (POs) transition system |
| Title | Event B |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119002727.ch10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dS8MwEA_bVBBfFBXnF3sQfNBqk7VN8qpMBWH6sMHeRpOmbLJ1Y5tj-Nd7-VhnHQh78CWUck1zvfZ6d7n7HUJXJBIBk4n0cJhKL2Ch73EuiCdkSHwRYUzrsWk2QZtN1unw91Ipr-KfD2iWscWCj_9V1HAOhK1LZzcQdz4pnIBjEDqMIHYYf1nExdjrstPm0FTb6r7Q09zGBANTf_gDtVhClOtIgEEGHrrioyzPFnBX56Kwe-luu32ksUhsoraNzMCvz0RmmkpN4o8bk7L98z1s6IRK19vZRRdwoLOgbAm71fzr6TvFHE3rh4KbyMC38XlBF1oUYPdbJbbZ9JrGtgiweg4Mtgk4yYTeyZ5LdS0iYf9FXkZlSkHPbT033tqvS41C9F4_WTlUJAQHjq0cTN0Wni0BD01Urg76KiIWa8CyxB0wWM6iK72Cm9-vr6Po4xgjpbWP9nThSk1XlAA_B6ikskO0Y55_7eEItZ8arccXzzW_8HqY0dQz3ZxSGkqmWIITBgtIaCSJ1KmgfhxQRXT1O2c8UiJVkUZijFmokroIsfJF_RhVslGmTlCNp0EohQpE7KcBT3CMIyAIYDIsCbgHVXRr1tw1-_PTrkWyJt0Cd13NnRmq6LpAXiT76o8t6ThJTzeb-Aztrl7Bc1SZTT7VBdqW81l_Orl0ov0GGkVC7A |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Formal+Methods+Applied+to+Complex+Systems%3A+Implementation+of+the+B+Method&rft.au=M%C3%A9ry%2C+Dominique&rft.au=Singh%2C+Neeraj+Kumar&rft.atitle=Event+B&rft.date=2014-06-26&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.isbn=9781848217096&rft.spage=253&rft.epage=298&rft_id=info:doi/10.1002%2F9781119002727.ch10&rft.externalDocID=10.1002%2F9781119002727.ch10 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/sc.gif&client=summon&freeimage=true |

