The B Book -Assigning Programs to Meanings, 1996. ,
Extending B without Changing it (for Developing Distributed Systems ), First B conference, Putting into Practice Methods and Tools for Information System Design, IRIN, pp.169-191, 1996. ,
Introducing dynamic constraints in B, 98: Recent Advances in the Development and Use of the B Method, pp.83-128, 1998. ,
DOI : 10.1007/BFb0053357
BZ-testing tools: A tool-set for test generation from Z and B using constraint logic programming, Formal Approaches to Testing of Software (FATES'02), pp.105-120, 2002. ,
Construction of Finite Labelled Transition Systems from B Abstract Systems, Integrated Formal Methods, pp.235-254, 1945. ,
DOI : 10.1007/3-540-40911-4_14
Predicate Diagrams for the Verification of Reactive Systems, Integrated Formal Methods, pp.380-397, 1945. ,
DOI : 10.1007/3-540-40911-4_22
URL : https://hal.archives-ouvertes.fr/inria-00099125
Diagram Refinements for the Design of Reactive Systems, Journal of Universal Computer Science, vol.7, issue.2, 2001. ,
Construction of abstract state graphs with PVS, Computer-Aided Verification (CAV'97), 1997. ,
DOI : 10.1007/3-540-63166-6_10
Communicating Sequential Processes, 1985. ,
The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994. ,
DOI : 10.1145/177492.177726
Contributions for Modelling UML State-Charts in B, IFM, LNCS 2335, pp.109-127, 2002. ,
DOI : 10.1007/3-540-47884-1_7
URL : https://hal.archives-ouvertes.fr/inria-00099403
ProB: A Model Checker for B, FME 2003: Formal Methods, LNCS 2805, pp.855-874, 1997. ,
DOI : 10.1007/978-3-540-45236-2_46
DEMONEY: Java Card Implementation. Public technical report, SEC- SAFE project, 2002. ,
DEMONEY : A demonstrative Electronic Purse -Card Specification -. Public technical report, SECSAFE project, 2002. ,
Access Control: Policies, Models, and Mechanisms. In Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design, pp.137-196, 2001. ,
Enforceable security policies. Information and System Security, pp.30-50, 2000. ,
DOI : 10.1109/fits.2003.1264930
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
SecSafe Porject Home Page ,
Translating Statecharts to B, IFM, LNCS 2335 21. SUN. Java Card, pp.128-144, 2002. ,
DOI : 10.1007/3-540-47884-1_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2394
Extending JML Specifications with Temporal Logic, Algebraic Methodology And Software Technology (AMAST '02), pp.334-348, 2002. ,
DOI : 10.1007/3-540-45719-4_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.6993
Generating Statecharts from B Specifications, 16th Int Conf. on Software and System Engineering and their applications, 2003. ,