Event B

This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework o...

Full description

Saved in:
Bibliographic Details
Published in:Formal Methods Applied to Complex Systems: Implementation of the B Method pp. 253 - 298
Main Authors: Méry, Dominique, Singh, Neeraj Kumar
Format: Book Chapter
Language:English
Published: Hoboken, NJ, USA John Wiley & Sons, Inc 26.06.2014
Subjects:
ISBN:1848217099, 9781848217096
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework of a transition system, which may model a program, an algorithm or a distributed system. It details the Event B language and related concepts such as events, contexts, machines and refinement. The chapter explains proof obligations (POs) generated for checking the consistency of the Event B structure. It develops three case studies, in order to illustrate the incremental and proof‐based modeling using Event B. The chapter emphasizes the notion of proof‐based patterns applied for the Event B method. It describes available tools for supporting the Event B modeling language concludes with the current and future trends for this method.
AbstractList This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual theories, which support Event B approach. The chapter explains how invariant properties and safety properties are defined in the framework of a transition system, which may model a program, an algorithm or a distributed system. It details the Event B language and related concepts such as events, contexts, machines and refinement. The chapter explains proof obligations (POs) generated for checking the consistency of the Event B structure. It develops three case studies, in order to illustrate the incremental and proof‐based modeling using Event B. The chapter emphasizes the notion of proof‐based patterns applied for the Event B method. It describes available tools for supporting the Event B modeling language concludes with the current and future trends for this method.
Author Singh, Neeraj Kumar
Méry, Dominique
Author_xml – sequence: 1
  givenname: Dominique
  surname: Méry
  fullname: Méry, Dominique
– sequence: 2
  givenname: Neeraj Kumar
  surname: Singh
  fullname: Singh, Neeraj Kumar
BookMark eNptj8FKA0EMhkdU1Na-gCdfYNcks7OTOWppbaHQSz0POzsZulh2CyuKPr1bK0LBS5I_5At8I3XRdq0odYeQIwA9OMuI6IbRks3rLcKZGv1t3PkQuGBCC85dq0nfNwGIAIFKvlFXs3dp3-6fbtVlqna9TH77WL3MZ5vpIlutn5fTx1W2RbYpMxpIJ2tqFo4YmZGjLWuqwRUaqsIKoSZw7EoJSUptHFdsJOpgUCDosdLHvx_NTj69hK577T2CP7j4Exd_cPkpA5X_Q51efzX7I7GPSX8DThlKeA
ContentType Book Chapter
Copyright Copyright © 2014 John Wiley & Sons, Inc.
Copyright_xml – notice: Copyright © 2014 John Wiley & Sons, Inc.
DOI 10.1002/9781119002727.ch10
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
EISBN 1119002729
9781119002727
Editor Boulanger, Jean‐Louis
Editor_xml – sequence: 1
  givenname: Jean‐Louis
  surname: Boulanger
  fullname: Boulanger, Jean‐Louis
EndPage 298
ExternalDocumentID 10.1002/9781119002727.ch10
Genre chapter
GroupedDBID 20A
38.
3XM
AABBV
AAPZQ
AARDG
ABARN
ABBFG
ABIAV
ABQPQ
ABQPW
ACGYG
ACLGV
ACNUM
ADVEM
AERYV
AFLZI
AFOJC
AHWGJ
AJFER
AKHYG
AKQZE
ALMA_UNASSIGNED_HOLDINGS
ASVIU
AZZ
BBABE
CZZ
GEOUK
IEZ
IPJKO
JFSCD
JJU
JP0
KJBCJ
LPRNP
LQKAK
LWYJN
LYPXV
MYL
OHSWP
OTAXI
PQQKQ
UZ6
W1A
YPLAZ
ZEEST
ID FETCH-LOGICAL-h187f-53023f75c8e8d1d8818d76c2c09430a47e213209896ebfe63598a85ed3b51e0b3
ISBN 1848217099
9781848217096
IngestDate Sat Nov 15 22:25:38 EST 2025
Wed Nov 27 04:54:49 EST 2019
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-h187f-53023f75c8e8d1d8818d76c2c09430a47e213209896ebfe63598a85ed3b51e0b3
PageCount 46
ParticipantIDs wiley_ebooks_10_1002_9781119002727_ch10_ch10
PublicationCentury 2000
PublicationDate 2014-06-26
PublicationDateYYYYMMDD 2014-06-26
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-06-26
  day: 26
PublicationDecade 2010
PublicationPlace Hoboken, NJ, USA
PublicationPlace_xml – name: Hoboken, NJ, USA
PublicationTitle Formal Methods Applied to Complex Systems: Implementation of the B Method
PublicationYear 2014
Publisher John Wiley & Sons, Inc
Publisher_xml – name: John Wiley & Sons, Inc
References Benaissa, Méry (cit15) 2009
Abrial (cit1) 1996
Mosbah (cit63) 2014
Méry, Singh (cit58) 2011
Clearsy (cit29) 2010
Clarke, Grunberg, Peled (cit26) 2000
cit36
Rehm (cit64) 2009; I
Chandy, Misra (cit25) 1988
Méry (cit46) 2009; 3
Singh (cit66) 2013
Méry, Singh (cit54) 2011
Dijkstra (cit34) 1976
Cousot, Cousot (cit31) 1979
Lamport (cit43) 2002
Abrial (cit6) 2010
Méry (cit45) 2009; 41
Benaissa, Cansell, Mery (cit11) 2007
Mcmillan (cit44) 1993
Holzmann (cit40) 1997; 16
Benaissa (cit12) 2008; 5238
Back (cit8) 1979; 23
Clearsy, Aix‐en‐Provence (F), Atelier (cit27) 2002
Clearsy (cit28) 2004
Cousot (cit33) 2000; 19
Méry, Singh (cit57) 2011; 7
Méry, Mosbah, Tounsi (cit48) 2010
(cit21) 2007
Cansell, Méry (cit23) 2007
Lamport (cit41) 1980
Méry, Singh (cit55) 2011
Benaissa (cit16) 2010; I
Méry, Singh (cit47) 2009
Abrial, Butler, Hallerstede (cit7) 2010; 12
Bjorner (cit18) 2006
Abrial, Butler, Hallerstede (cit5) 2008; 5238
Singh (cit65) 2011; 1
Bjorner (cit20) 2006
Morgan (cit62) 1990
Abrial, Cansell, Méry (cit2) 2003; 14
Benaissa, Méry (cit17) 2010; 6072
Méry, Singh (cit60) 2011
Abrial, Cansell (cit4) 2003; 2758
Hoang, Kuruma, Basin (cit39) 2009; 74
Cousot, Cousot (cit32) 1992; 2
Méry, Mosbah, Tounsi (cit52) 2011; 6664
Abrial (cit3) 2003; 2805
Hoang, Furst, Abrial (cit38) 2009
Bjorner (cit19) 2006
Méry, Singh (cit49) 2010; 1
Lamport (cit42) 1994; 16
Méry, Singh (cit53) 2011
Cansell, Méry, Rehm (cit24) 2007; 4355
Cansell (cit22)
Méry, Singh (cit56) 2011
Back, Kurki‐Suonio (cit9) 1989; 3
Turing (cit67) 1949
Cousot (cit30) 1978; 21
Hoare (cit37) 1969; 12
Méry, Monahan (cit61) 2013; 16
Benaissa, Méry (cit14) 2009
Méry, Singh (cit59) 2011
Méry, Singh (cit51) 2010; 6416
Floyd (cit35) 1967; 19
Back, von Wright (cit10) 1998
Benaissa, Méry (cit13) 2009
Méry, Singh (cit50) 2010
References_xml – volume: 6072
  start-page: 25
  year: 2010
  end-page: 36
  ident: cit17
  article-title: Proof‐based design of security protocols
  publication-title: 5th International Computer Science Symposium in Russia, CSR 2010, Lecture Notes in Computer Science
– year: 1976
  ident: cit34
  article-title: A Discipline of Programming
– start-page: 174
  year: 1980
  end-page: 185
  ident: cit41
  article-title: Sometime is sometimes not never: a tutorial on the temporal logic of programs
  publication-title: Proceedings of the Seventh Annual Symposium on Principles of Programming Languages
– volume: 6664
  start-page: 338
  year: 2011
  end-page: 352
  ident: cit52
  article-title: Refinement‐Based Verification of Local Synchronization Algorithms
– volume: 14
  start-page: 215
  issue: 3
  year: 2003
  end-page: 227
  ident: cit2
  article-title: A mechanically proved and incremental development of IEEE 1394 tree identify protocol
  publication-title: Formal Aspects of Computing
– volume: 2758
  start-page: 1
  year: 2003
  end-page: 24
  ident: cit4
  article-title: Click'n prove: interactive proofs within set theory
  publication-title: TPHOLs, Lecture Notes in Computer Science
– volume: 74
  start-page: 879
  issue: 11–12
  year: 2009
  end-page: 899
  ident: cit39
  article-title: Developing topology discovery in Event‐B
  publication-title: Sci. Comput. Program.
– volume: 1
  year: 2011
  ident: cit65
  article-title: Fiabilité et sûreté des systèmes informatiques critiques
– year: 2011
  ident: cit54
  article-title: Analysis of DSR protocol in Event‐B
  publication-title: 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011)
– year: 2011
  ident: cit55
  article-title: B2C : A Tool for Event‐B to C Conversion Support
– volume: 6416
  start-page: 312
  year: 2010
  end-page: 326
  ident: cit51
  article-title: Trustable formal specification for software certification
  publication-title: 4th International Symposium On Leveraging Applications of Formal Methods – ISOLA 2010
– year: 1990
  ident: cit62
  article-title: Programming from Specifications
– volume: 2
  start-page: 511
  issue: 4
  year: 1992
  end-page: 547
  ident: cit32
  article-title: Abstract interpretation frameworks
  publication-title: Journal of Logic and Computation
– volume: I
  year: 2009
  ident: cit64
  article-title: Gestion du temps par le raffinement
– year: 2011
  ident: cit56
  article-title: Formal development and automatic code generation: cardiac pacemaker
  publication-title: International Conference on Computers and Advanced Technology in Education (ICCATE 2011)
– volume: 5238
  start-page: 347
  year: 2008
  ident: cit5
  article-title: A Roadmap for the Rodin Toolset
  publication-title: ABZ, Lecture Notes in Computer Science
– year: 2007
  ident: cit21
  article-title: Logics of Specification Languages
– start-page: 210
  year: 2009
  end-page: 219
  ident: cit38
  article-title: Event‐B patterns and their tool support
  publication-title: SEFM
– year: 2004
  ident: cit28
  article-title: B4FREE
– year: 2011
  ident: cit59
  article-title: A generic framework: from modeling to code
  publication-title: Fourth IEEE International workshop UML and Formal Methods (UML&FM'2011), (to be appeared in special issue of ISSE NASA Journal, Innovations in Systems and Software Engineering)
– volume: 7
  start-page: 227
  issue: 4
  year: 2011
  end-page: 235
  ident: cit57
  article-title: A generic framework: from modeling to code
  publication-title: ISSE
– volume: 16
  start-page: 57
  year: 2013
  end-page: 73
  ident: cit61
  article-title: Transforming Event B models into verified C# implementations
  publication-title: VPT@CAV, of EPiC Series
– start-page: 269
  year: 1979
  end-page: 282
  ident: cit31
  article-title: Systematic design of program analysis frameworks
  publication-title: Proceedings Records of Sixth Proceedings of the Symposium on Principles of Programming Languages
– volume: 16
  start-page: 872
  issue: 3
  year: 1994
  end-page: 923
  ident: cit42
  article-title: A temporal logic of actions
  publication-title: Transactions On Programming Languages and Systems
– year: 2014
  ident: cit63
  article-title: VISIDIA
– volume: 12
  start-page: 576
  year: 1969
  end-page: 580
  ident: cit37
  article-title: An axiomatic basis for computer programming
  publication-title: Communications of the Association for Computing Machinery
– year: 2000
  ident: cit26
  article-title: Model Checking
– year: 2011
  ident: cit58
  article-title: Formalisation of the heart based on conduction of electrical impulses and cellular‐automata
  publication-title: International Symposium on Foundations of Health Information Engineering and Systems (FHIES 2011)
– year: 2011
  ident: cit53
  article-title: EB2C: a tool for Event‐B to C conversion support
– year: 1998
  ident: cit10
  article-title: Refinement Calculus A Systematic Introduction
– year: 2006
  ident: cit19
  article-title: Software Engineering 2 Specification of Systems and Languages
– volume: 41
  start-page: 51
  issue: 2
  year: 2009
  end-page: 59
  ident: cit45
  article-title: A simple refinement‐based method for constructing algorithms
  publication-title: ACM SIGCSE Bulletin
– year: 2010
  ident: cit50
  article-title: Technical report on formal development of two‐electrode cardiac pacing system, Research report
– volume: 5238
  start-page: 251
  year: 2008
  end-page: 264
  ident: cit12
  article-title: Modeling attacker's knowledge for cascade cryptographic protocols
  publication-title: First International Conference on Abstract State Machines, B and Z – ABZ 2008
– year: 2011
  ident: cit60
  article-title: Medical protocol diagnosis using formal methods
  publication-title: International Symposium on Foundations of Health Information Engineering and Systems (FHIES 2011)
– year: 1993
  ident: cit44
  article-title: Symbolic Model Checking
– ident: cit36
  article-title: The ProB animator and model checker
– year: 1988
  ident: cit25
  article-title: Parallel Program Design A Foundation
– start-page: 33
  year: 2007
  end-page: 140
  ident: cit23
  article-title: The Event‐B Modeling Method: Concepts and Case Studies
– volume: 21
  year: 1978
  ident: cit30
  article-title: Méthodes itératives de construction et d'approximation de points fixes d'opérateurs monotones sur un treillis, analyse sémantique des programmes
– volume: 12
  start-page: 447
  issue: 6
  year: 2010
  end-page: 466
  ident: cit7
  article-title: Rodin: an open toolset for modeling and reasoning in Event‐B
  publication-title: STTT
– year: 2009
  ident: cit13
  article-title: Cryptographic protocols analysis in Event B
  publication-title: Seventh International Andrei Ershov Memorial Conference “PERSPECTIVES OF SYSTEM INFORMATICS” – PSI 2009
– year: 2006
  ident: cit18
  article-title: Software Engineering 1 Abstraction and Modeling
– volume: 19
  start-page: 19
  year: 1967
  end-page: 32
  ident: cit35
  article-title: Assigning meanings to programs
  publication-title: Proc. Symp. Appl. Math. 19, Mathematical Aspects of Computer Science
– year: 1996
  ident: cit1
  article-title: The B book – Assigning Programs to Meanings
– ident: cit22
  article-title: Click'N'Prove
– volume: 23
  start-page: 49
  issue: 1
  year: 1979
  end-page: 68
  ident: cit8
  article-title: On correct refinement of programs
  publication-title: Journal of Computer and System Sciences
– year: 2010
  ident: cit6
  article-title: Modeling in Event‐B: System and Software Engineering
– year: 1949
  ident: cit67
  article-title: On checking a large routine
  publication-title: Conference on High‐Speed Automatic Calculating Machines
– volume: 2805
  start-page: 51
  year: 2003
  end-page: 74
  ident: cit3
  article-title: Event based sequential program development: application to constructing a pointer program
  publication-title: FME, Lecture Notes in Computer Science
– year: 2007
  ident: cit11
  article-title: Integration of security policy into system modeling
  publication-title: The 7th International B Conference – B2007
– volume: 3
  start-page: 197
  issue: 2–3
  year: 2009
  end-page: 239
  ident: cit46
  article-title: Refinement‐Bbsed guidelines for algorithmic systems
  publication-title: International Journal of Software and Informatics
– year: 2009
  ident: cit47
  article-title: Pacemaker's functional behaviors in Event‐B
– year: 2006
  ident: cit20
  article-title: Software Engineering 3 Domains, Requirements, and Software Design
– volume: 4355
  start-page: 140
  year: 2007
  end-page: 154
  ident: cit24
  article-title: Time constraint patterns for Event B development
  publication-title: 7th International Conference of B Users
– volume: 3
  start-page: 73
  issue: 2
  year: 1989
  end-page: 87
  ident: cit9
  article-title: Decentralization of process nets with centralized control
  publication-title: Distributed Computing
– volume: 1
  year: 2010
  ident: cit49
  article-title: Functional behavior of a cardiac pacing system
  publication-title: International Journal of Discrete Event Control Systems (IJDECS)
– volume: 19
  start-page: 155
  issue: 1–2–3
  year: 2000
  end-page: 164
  ident: cit33
  article-title: Interprétation abstraite
  publication-title: Technique et science informatique
– year: 2010
  ident: cit48
  article-title: Proving distributed algorithms by combining refinement and local computations
  publication-title: AVOCS 2010 10th International Workshop on Automated Verification of Critical Systems
– year: 2013
  ident: cit66
  article-title: Using Event‐B for Critical Device Software Systems
– year: 2002
  ident: cit43
  article-title: Specifying Systems: The TLA+ + Language and Tools for Hardware and Software Engineers
– year: 2009
  ident: cit14
  article-title: Cryptologic protocols analysis using proof‐based patterns
  publication-title: Seventh International Andrei Ershov Memorial Conference “PERSPECTIVES OF SYSTEM INFORMATICS” – PSI 2009
– year: 2009
  ident: cit15
  article-title: Développement combiné et prouvé de systèmes transactionnels cryptologiques
  publication-title: Approches Formelles dans l'Assistance au Développement de Logiciels – AFADL 2009
– volume: I
  year: 2010
  ident: cit16
  article-title: La composition des protocoles de sécurité avec la méthode B événementielle
– year: 2010
  ident: cit29
  article-title: BART
– volume: 16
  start-page: 1512
  issue: 5
  year: 1997
  end-page: 1542
  ident: cit40
  article-title: The spin model checker
  publication-title: IEEE Trans. on software engineering
– year: 2002
  ident: cit27
SSID ssib022010268
ssib025862898
ssj0001379362
ssib039408759
Score 1.4446911
Snippet This chapter provides results on the modeling and verification of systems using transition systems. The goal is to provide the basic fundamental and conceptual...
SourceID wiley
SourceType Enrichment Source
Publisher
StartPage 253
SubjectTerms Event B
proof obligations (POs)
transition system
Title Event B
URI https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119002727.ch10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dS8MwEA_bVBBfFBXnF3sQfNBqk7VN8qpMBWH6sMHeRpOmbLJ1Y5tj-Nd7-VhnHQh78CWUck1zvfZ6d7n7HUJXJBIBk4n0cJhKL2Ch73EuiCdkSHwRYUzrsWk2QZtN1unw91Ipr-KfD2iWscWCj_9V1HAOhK1LZzcQdz4pnIBjEDqMIHYYf1nExdjrstPm0FTb6r7Q09zGBANTf_gDtVhClOtIgEEGHrrioyzPFnBX56Kwe-luu32ksUhsoraNzMCvz0RmmkpN4o8bk7L98z1s6IRK19vZRRdwoLOgbAm71fzr6TvFHE3rh4KbyMC38XlBF1oUYPdbJbbZ9JrGtgiweg4Mtgk4yYTeyZ5LdS0iYf9FXkZlSkHPbT033tqvS41C9F4_WTlUJAQHjq0cTN0Wni0BD01Urg76KiIWa8CyxB0wWM6iK72Cm9-vr6Po4xgjpbWP9nThSk1XlAA_B6ikskO0Y55_7eEItZ8arccXzzW_8HqY0dQz3ZxSGkqmWIITBgtIaCSJ1KmgfhxQRXT1O2c8UiJVkUZijFmokroIsfJF_RhVslGmTlCNp0EohQpE7KcBT3CMIyAIYDIsCbgHVXRr1tw1-_PTrkWyJt0Cd13NnRmq6LpAXiT76o8t6ThJTzeb-Aztrl7Bc1SZTT7VBdqW81l_Orl0ov0GGkVC7A
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Formal+Methods+Applied+to+Complex+Systems%3A+Implementation+of+the+B+Method&rft.au=M%C3%A9ry%2C+Dominique&rft.au=Singh%2C+Neeraj+Kumar&rft.atitle=Event+B&rft.date=2014-06-26&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.isbn=9781848217096&rft.spage=253&rft.epage=298&rft_id=info:doi/10.1002%2F9781119002727.ch10&rft.externalDocID=10.1002%2F9781119002727.ch10
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781848217096/sc.gif&client=summon&freeimage=true