[1]
Alistair Kelman. Secure electronic transactions - introduction and technical reference by loeb l. (1998). Journal of Information, Law and Technology, 1998(2), (1998).
Google Scholar
[2]
Sanae El Mimouni and Mohamed Bouhdadi. An incremental proof-based process of the netbill electronic commerce protocol. In Networked Systems - 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised Selected Papers, pages 209-213, (2016).
DOI: 10.1007/978-3-319-46140-3_17
Google Scholar
[3]
Edmund M. Clarke and Jeannette M. Wing. Formal methods: State of the art and future directions. ACM Comput. Surv., 28(4):626-643, (1996).
DOI: 10.1145/242223.242257
Google Scholar
[4]
Mauricio Papa, Oliver Bremer, John Hale, and Sujeet Shenoi. Formal analysis of e-commerce protocols. In Fifth International Symposium on Autonomous Decentralized Systems, ISADS 2001, Dallas, Texas, USA, March 26-28, 2001, pages 19-28, (2001).
DOI: 10.1109/isads.2001.917391
Google Scholar
[5]
Shiyong Lu and Scott A. Smolka. Model checking the secure electronic transaction (set) protocol. In MASCOTS, pages 358-364, (1999).
Google Scholar
[6]
Michael Butler and Divakar Yadav. An incremental development of the mondex system in eventb. Formal Aspects of Computing, 20(1):61-77, January (2008).
DOI: 10.1007/s00165-007-0061-4
Google Scholar
[7]
J. R. Abrial. Modeling in Event-B: System and Software Engineering. Cambridge University Press, (2010).
Google Scholar
[8]
J. R. Abrial. The B-book: assigning programs to meanings. Cambridge University Press, New York and NY and USA, (1996).
Google Scholar
[9]
Thierry Lecomte. Safe and reliable metro platform screen doors control/command systems. In Jorge Cuéllar, T. S. E. Maibaum, and Kaisa Sere, editors, FM, volume 5014 of Lecture Notes in Computer Science, pages 430-434. Springer, (2008).
DOI: 10.1007/978-3-540-68237-0_32
Google Scholar
[10]
S. Gerhart, D. Craigen, and T. Ralston. Case study: Paris metro signaling system. IEEE Software, 11(1):32-28, Jan (1994).
DOI: 10.1109/ms.1994.1279941
Google Scholar
[11]
Willem P. De Roever and Kai Engelhardt. Data Refinement: Model-oriented Proof Theories and their Comparison, volume 46 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, (1998).
Google Scholar
[12]
Jean Raymond Abrial, Michael J. Butler, Stefan Hallerstede, Thai Son Hoang, Farhad Mehta, and Laurent Voisin. Rodin: an open toolset for modelling and reasoning in event-b. STTT, 12(6):447- 466, (2010).
DOI: 10.1007/s10009-010-0145-y
Google Scholar
[13]
J. R. Abrial. Summary of Event-B proof obligations, 2008 (accessed June 30,2017). http://www.docstoc.com/docs/7055755.
Google Scholar
[14]
Event-B and RODINs, (accessed July 20, 2017). http://wiki.event-b.org/index.php/MainPagef.
Google Scholar
[15]
Max Breitling and Jan Philipps. Transitions into Black Box Views -The NetBill Protocol Revisited-. Technical report, Institut fur Informatik Technische Universitat Munchen, (2000).
Google Scholar