Skip to main content

GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties

  • Conference paper
ZB 2005: Formal Specification and Development in Z and B (ZB 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3455))

Included in the following conference series:

Abstract

In this paper, we present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the behaviors of the initial B event system. So, it can be used to reason about them. We illustrate the use of GeneSyst to check security properties on a model of electronic purse.

This work was done in the GECCOO project of program “ACI : Sécurité Informatique” supported by the French Ministry of Research and New Technologies. It is also suported by CNRS and ST-Microelectronics by the way of a doctoral grant.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrial, J.-R.: The B Book - Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)

    Book  MATH  Google Scholar 

  2. Abrial, J.-R.: Extending B without Changing it (for Developing Distributed Systems). In: Habrias, H. (ed.) First B conference, Putting into Practice Methods and Tools for Information System Design, IRIN, pp. 169–191 (1996)

    Google Scholar 

  3. Abrial, J.R., Mussat, L.: Introducing Dynamic Constraints in B. In: Bert, D. (ed.) B 1998. LNCS, vol. 1393, pp. 83–128. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Ambert, F., Bouquet, F., Chemin, S., Guenaud, S., Legeard, B., Peureux, F., Utting, M., Vacelet, N.: BZ-testing tools: A tool-set for test generation from Z and B using constraint logic programming. In: Formal Approaches to Testing of Software (FATES 2002), pp. 105–120. INRIA (2002)

    Google Scholar 

  5. Bert, D., Cave, F.: Construction of Finite Labelled Transition Systems from B Abstract Systems. In: Grieskamp, W., Santen, T., Stoddart, B. (eds.) IFM 2000. LNCS, vol. 1945, pp. 235–254. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Cansell, D., Méry, D., Merz, S.: Predicate Diagrams for the Verification of Reactive Systems. In: Grieskamp, W., Santen, T., Stoddart, B. (eds.) IFM 2000. LNCS, vol. 1945, pp. 380–397. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Cansell, D., Méry, D., Merz, S.: Diagram Refinements for the Design of Reactive Systems. Journal of Universal Computer Science 7(2) (2001)

    Google Scholar 

  8. Common Criteria. Common Criteria for Information Technology Security Evaluation, Norme ISO 15408 - version 2.1, Aout (1999)

    Google Scholar 

  9. Graf, S., Saïdi, H.: Construction of Abstract State Graphs with PVS. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254. Springer, Heidelberg (1997)

    Google Scholar 

  10. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)

    MATH  Google Scholar 

  11. Lamport, L.: A Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)

    Article  Google Scholar 

  12. Lamport, L.: TLA in Pictures. Software Engineering 21(9), 768–775 (1995)

    Article  Google Scholar 

  13. Ledang, H., Souquières, J.: Contributions for Modelling UML State-charts in B. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 109–127. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Leuschel, M., Butler, M.: ProB: A Model Checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 855–874. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Marlet, R.: DEMONEY: Java Card Implementation. Public technical report, SECSAFE project, 11 (2002)

    Google Scholar 

  16. Marlet, R., Mesnil, C.: DEMONEY: A demonstrative Electronic Purse - Card Specification -. Public technical report, SECSAFE project, 11 (2002)

    Google Scholar 

  17. Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Schneider, F.B.: Enforceable security policies. Information and System Security 3(1), 30–50 (2000)

    Article  Google Scholar 

  19. SecSafe. SecSafe Porject Home Page, http://www.doc.ic.ac.uk/~siveroni/secsafe/

  20. Sekerinski, E., Zurob, R.: Translating Statecharts to B. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 128–144. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  21. SUN. Java Card 2.1 Platform Specifications, http://java.sun.com/products/javacard/specs.html

  22. Trentelman, K., Huisman, M.: Extending JML Specifications with Temporal Logic. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 334–348. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  23. Voisinet, J.-C., Tatibouet, B.: Generating Statecharts from B Specifications. In: 16th Int Conf. on Software and System Engineering and their applications (ISCEA 2003), vol. 1 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bert, D., Potet, ML., Stouls, N. (2005). GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties. In: Treharne, H., King, S., Henson, M., Schneider, S. (eds) ZB 2005: Formal Specification and Development in Z and B. ZB 2005. Lecture Notes in Computer Science, vol 3455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11415787_18

Download citation

  • DOI: https://doi.org/10.1007/11415787_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25559-8

  • Online ISBN: 978-3-540-32007-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics