Communicating sequential processes
Communicating sequential processes
The B-book: assigning programs to meanings
The B-book: assigning programs to meanings
The functional approach to programming
The functional approach to programming
ZB '02 Proceedings of the 2nd International Conference of B and Z Users on Formal Specification and Development in Z and B
Introducing Dynamic Constraints in B
B '98 Proceedings of the Second International B Conference on Recent Advances in the Development and Use of the B Method
Identifying Pre-Conditions with the Z/EVES Theorem Prover
ASE '98 Proceedings of the 13th IEEE international conference on Automated software engineering
How to Verify Dynamic Properties of Information Systems
SEFM '04 Proceedings of the Software Engineering and Formal Methods, Second International Conference
Fundamentals of Database Systems, Fourth Edition
Fundamentals of Database Systems, Fourth Edition
Generating Relational Database Transactions From Recursive Functions Defined on EB^3 Traces
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Proving event ordering properties for information systems
ZB'03 Proceedings of the 3rd international conference on Formal specification and development in Z and B
Mapping object diagrams into B specifications
Methods'96 Proceedings of the 1996 international conference on Methods Integration
Efficient symbolic computation of process expressions
Science of Computer Programming
Refinement of EB3 process patterns into B specifications
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Hi-index | 0.00 |
eb3 is a trace-based formal language created for the specification of information systems (IS). Attributes, linked to entities and associations of an IS, are computed in eb3 by recursive functions on the valid traces of the system. On the other hand, B is a state-based formal language also well adapted for the specification of IS. In this paper, we deal with the synthesis of B specifications that correspond to eb3 attribute definitions, in order to specify and verify safety properties like data integrity constraints. Each action in the eb3 specification is translated into a B operation. The substitutions are obtained by an analysis of the CAML-like patterns used in the recursive functions that define the attributes in eb3. Our technique is illustrated by an example of a simple library management system.