J. Abrial, Modeling in Event-B: System and Software Engineering, 2010.
DOI : 10.1017/CBO9781139195881

K. and J. Barwise, CONDITIONALS AND CONDITIONAL INFORMATION, On Conditionals, pp.21-54, 1986.
DOI : 10.1017/CBO9780511753466.003

N. Benaissa, Modelling Attacker???s Knowledge for Cascade Cryptographic Protocols, First International Conference on Abstract State Machines, pp.251-264, 2008.
DOI : 10.1007/978-3-540-87603-8_20

N. Benaïssa and D. Méry, Proof-based design of security protocols In Computer Science -Theory and Applications, 5th International Computer Science Symposium in Russia, Proceedings, pp.25-36, 2010.

D. Bjorner, Software Engineering 3 Domains, Requirements, and Software Design Texts in Theoretical Computer Science. An EATCS Series, 2006.

L. Chiang, Trust and security in the e-voting system, Electronic Government, an International Journal, vol.6, issue.4, pp.343-360, 2009.
DOI : 10.1504/EG.2009.027782

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, A generic construction for voting correctness at minimum cost-application to helios, IACR Cryptology ePrint Archive, p.177, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00881079

R. Dapoigny and P. Barlatier, Modeling contexts with dependent types, Fundam. Inform, vol.104, issue.4, pp.293-327, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00547613

J. , P. Gibson, R. Krimmer, V. Teague, and J. Pomares, A review of e-voting: the past, present and future, Annals of Telecommunications, vol.71, issue.7, pp.279-286, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01364859

J. , P. Gibson, E. Lallet, and J. Raffy, Feature interactions in a software product line for e-voting, Feature Interactions in Software and Communication Systems X, pp.91-106, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00817774

A. Thai-son-hoang, J. Furst, and . Abrial, Event-b patterns and their tool support, Software Engineering and Formal Methods, International Conference on, pp.210-219, 2009.

S. Kherroubi and D. Méry, Contextualisation et dépendance en Event- B, Approches Formelles dans l'Assistance au D'éveloppement de Logiciels, 2017.

G. Kotonya and I. Sommerville, Requirements Engineering: Processes and Techniques, 1998.

S. Kremer and M. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Programming Languages and Systems, 14th European Symposium on Programming,ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005 Proceedings, pp.186-200, 2005.
DOI : 10.1007/978-3-540-31987-0_14

L. Lamport, The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994.
DOI : 10.1145/177492.177726

T. Gary, J. Leavens, D. S. Abrial, M. J. Batory, A. Butler et al., Roadmap for enhanced languages and methods to aid verification, GPCE, pp.221-236, 2006.

J. Mccarthy, Notes on formalizing context, Proceedings of the 13th International Joint Conference on Artifical Intelligence IJCAI'93, pp.555-560, 1993.

D. Méry and M. Poppleton, Towards An Integrated Formal Method for Verification of Liveness Properties in Distributed Systems, Software and Systems Modeling (SoSyM), 2015.

S. Myagmar, J. Adam, W. Lee, and . Yurcik, Threat modeling as a basis for security requirements, Symposium on Requirements Engineering for Information Security (SREIS). IEEE, 2005.