Abstract
In this paper, we present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the behaviors of the initial B event system. So, it can be used to reason about them. We illustrate the use of GeneSyst to check security properties on a model of electronic purse.
This work was done in the GECCOO project of program “ACI : Sécurité Informatique” supported by the French Ministry of Research and New Technologies. It is also suported by CNRS and ST-Microelectronics by the way of a doctoral grant.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abrial, J.-R.: The B Book - Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)
Abrial, J.-R.: Extending B without Changing it (for Developing Distributed Systems). In: Habrias, H. (ed.) First B conference, Putting into Practice Methods and Tools for Information System Design, IRIN, pp. 169–191 (1996)
Abrial, J.R., Mussat, L.: Introducing Dynamic Constraints in B. In: Bert, D. (ed.) B 1998. LNCS, vol. 1393, pp. 83–128. Springer, Heidelberg (1998)
Ambert, F., Bouquet, F., Chemin, S., Guenaud, S., Legeard, B., Peureux, F., Utting, M., Vacelet, N.: BZ-testing tools: A tool-set for test generation from Z and B using constraint logic programming. In: Formal Approaches to Testing of Software (FATES 2002), pp. 105–120. INRIA (2002)
Bert, D., Cave, F.: Construction of Finite Labelled Transition Systems from B Abstract Systems. In: Grieskamp, W., Santen, T., Stoddart, B. (eds.) IFM 2000. LNCS, vol. 1945, pp. 235–254. Springer, Heidelberg (2000)
Cansell, D., Méry, D., Merz, S.: Predicate Diagrams for the Verification of Reactive Systems. In: Grieskamp, W., Santen, T., Stoddart, B. (eds.) IFM 2000. LNCS, vol. 1945, pp. 380–397. Springer, Heidelberg (2000)
Cansell, D., Méry, D., Merz, S.: Diagram Refinements for the Design of Reactive Systems. Journal of Universal Computer Science 7(2) (2001)
Common Criteria. Common Criteria for Information Technology Security Evaluation, Norme ISO 15408 - version 2.1, Aout (1999)
Graf, S., Saïdi, H.: Construction of Abstract State Graphs with PVS. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254. Springer, Heidelberg (1997)
Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)
Lamport, L.: A Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)
Lamport, L.: TLA in Pictures. Software Engineering 21(9), 768–775 (1995)
Ledang, H., Souquières, J.: Contributions for Modelling UML State-charts in B. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 109–127. Springer, Heidelberg (2002)
Leuschel, M., Butler, M.: ProB: A Model Checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 855–874. Springer, Heidelberg (2003)
Marlet, R.: DEMONEY: Java Card Implementation. Public technical report, SECSAFE project, 11 (2002)
Marlet, R., Mesnil, C.: DEMONEY: A demonstrative Electronic Purse - Card Specification -. Public technical report, SECSAFE project, 11 (2002)
Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)
Schneider, F.B.: Enforceable security policies. Information and System Security 3(1), 30–50 (2000)
SecSafe. SecSafe Porject Home Page, http://www.doc.ic.ac.uk/~siveroni/secsafe/
Sekerinski, E., Zurob, R.: Translating Statecharts to B. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 128–144. Springer, Heidelberg (2002)
SUN. Java Card 2.1 Platform Specifications, http://java.sun.com/products/javacard/specs.html
Trentelman, K., Huisman, M.: Extending JML Specifications with Temporal Logic. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 334–348. Springer, Heidelberg (2002)
Voisinet, J.-C., Tatibouet, B.: Generating Statecharts from B Specifications. In: 16th Int Conf. on Software and System Engineering and their applications (ISCEA 2003), vol. 1 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bert, D., Potet, ML., Stouls, N. (2005). GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties. In: Treharne, H., King, S., Henson, M., Schneider, S. (eds) ZB 2005: Formal Specification and Development in Z and B. ZB 2005. Lecture Notes in Computer Science, vol 3455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11415787_18
Download citation
DOI: https://doi.org/10.1007/11415787_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25559-8
Online ISBN: 978-3-540-32007-4
eBook Packages: Computer ScienceComputer Science (R0)