PVS: A prototype verification system, 11th International Conference on Automated Deduction (CADE), pp.748-752, 1992. ,
DOI : 10.1007/3-540-55602-8_217
Isabelle/HOL ? A Proof Assistant for Higher-Order Logic, ser. Lecture Notes in Computer Science, 2002. ,
M??T??OR: An industrial success in formal development, B '98: Proceedings of the Second International B Conference on Recent Advances in the Development and Use of the B Method, p.26, 1998. ,
DOI : 10.1007/BFb0053352
Inductively defined types, Conference on Computer Logic, pp.50-66, 1988. ,
DOI : 10.1007/3-540-52335-9_47
Functional Testing in the Focal Environment, Test And Proof, pp.84-98, 2008. ,
DOI : 10.1007/978-3-540-79124-9_7
URL : https://hal.archives-ouvertes.fr/hal-01125411
LEIRIOS test generator: Automated test generation from B models in The 7th International B Conference, ser. Lecture Notes in Computer Science, pp.277-280, 2007. ,
Model checking, pp.305-349, 1996. ,
Validating Z specifications using the ProBAnimator and model checker, " in IFM, ser. Lecture Notes in Computer Science, pp.480-500, 2007. ,
Model Checking TLA+ Specifications, CHARME, ser. Lecture Notes in Computer Science, vol.1703, pp.54-66, 1999. ,
DOI : 10.1007/3-540-48153-2_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.9499
On the Notion of Vacuous Truth, Lecture Notes in Computer Science, vol.4790, pp.2-14, 2007. ,
DOI : 10.1007/978-3-540-75560-9_2
Building certified components within FOCAL, Trends in Functional Programming, H.-W. Loidl, pp.33-48, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-01124970
Algebraic structures and dependent records, Proceedings of TPHOL'03, 2003. ,
Making proofs in a hierarchy of mathematical structures, 11th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning, pp.89-100, 2003. ,
Formal verification of security properties of smart card embedded source code, " in FM, ser. Lecture Notes in Computer Science, pp.302-317, 2005. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Breaking the model: Finalisation and a taxonomy of security attacks Proof obligations for monomorphicity ,
A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999. ,
DOI : 10.1145/292540.292555
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1992. ,
DOI : 10.1109/SP.1982.10014
Integration of security policy into system modeling, " in B, ser. Lecture Notes in Computer Science, pp.232-247, 2007. ,
Meca: A tool for access control models, " in B, ser. Lecture Notes in Computer Science, pp.281-284, 2007. ,
The B-Method for the Construction of Microkernel-Based Systems, Lecture Notes in Computer Science, vol.4355, issue.4790, pp.257-259, 2007. ,
DOI : 10.1007/11955757_23
Mechanizing Programming Logics in Higher Order Logic, Current Trends in Hardware Verification and Automatic Theorem Proving (Proceedings of the Workshop on Hardware Verification), pp.387-439, 1988. ,
DOI : 10.1007/978-1-4612-3658-0_10
A survey on embedding programming logics in a theorem prover, Institute of Information and Computing Sciences, 2002. ,
Formalisation of B in Isabelle/HOL, Lecture Notes in Computer Science, vol.1393, pp.66-82, 1998. ,
DOI : 10.1007/BFb0053356
A formalization of the B- Method in Coq and PVS, Electronic Proceedings of the B-User Group Meeting at the World Congress on Formal Methods FM 99, pp.33-49, 1999. ,
Auto-validation d'un système de preuves avec familles inductives, Thèse de Doctorat, 1999. ,
A Mechanically Verified, Sound and Complete Theorem Prover for First Order Logic, TPHOLs, ser. Lecture Notes in Computer Science, vol.3603, pp.294-309, 2005. ,
DOI : 10.1007/11541868_19
On the Security of PKCS #11, CHES, ser. Lecture Notes in Computer Science, pp.411-425, 2003. ,
DOI : 10.1007/978-3-540-45238-6_32
Seven myths of formal methods, IEEE Software, vol.7, issue.5, pp.11-19, 1990. ,
DOI : 10.1109/52.57887
98: Recent Advances in the Development and Use of the B Method, Second International B Conference, Proceedings, ser. Lecture Notes in Computer Science, vol.1393, 1998. ,