{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:28:33Z","timestamp":1725888513931},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319602240"},{"type":"electronic","value":"9783319602257"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60225-7_9","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:37Z","timestamp":1495851997000},"page":"124-138","source":"Crossref","is-referenced-by-count":4,"title":["Applying a Dependency Mechanism for Voting Protocol Models Using Event-B"],"prefix":"10.1007","author":[{"given":"J. Paul","family":"Gibson","sequence":"first","affiliation":[]},{"given":"Souad","family":"Kherroubi","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"M\u00e9ry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B: System and Software Engineering","author":"J-R Abrial","year":"2010","unstructured":"Abrial, J.-R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)"},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1017\/CBO9780511753466.003","volume-title":"On Conditionals","author":"K Jon Barwise","year":"1986","unstructured":"Jon Barwise, K.: Conditionals and conditional information. In: Traugott, E., ter Meulen, A., Reilly, J., Ferguson, C. (eds.) On Conditionals, pp. 21\u201354. Cambridge University Press, Cambridge (1986)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-87603-8_20","volume-title":"Abstract State Machines, B and Z","author":"N Benaissa","year":"2008","unstructured":"Benaissa, N.: Modelling attacker\u2019s knowledge for cascade cryptographic protocols. In: B\u00f6rger, E., Butler, M., Bowen, J.P., Boca, P. (eds.) ABZ 2008. LNCS, vol. 5238, pp. 251\u2013264. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-87603-8_20"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-13182-0_3","volume-title":"Computer Science \u2013 Theory and Applications","author":"N Benaissa","year":"2010","unstructured":"Benaissa, N., M\u00e9ry, D.: Proof-based design of security protocols. In: Ablayev, F., Mayr, E.W. (eds.) CSR 2010. LNCS, vol. 6072, pp. 25\u201336. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13182-0_3"},{"key":"9_CR5","series-title":"Texts in Theoretical Computer Science. An EATCS Series","volume-title":"Software Engineering 3 Domains, Requirements, and Software Design","author":"D Bjorner","year":"2006","unstructured":"Bjorner, D.: Software Engineering 3 Domains, Requirements, and Software Design. Texts in Theoretical Computer Science. An EATCS Series. Springer, Heidelberg (2006)"},{"issue":"4","key":"9_CR6","first-page":"343","volume":"6","author":"L Chiang","year":"2009","unstructured":"Chiang, L.: Trust and security in the e-voting system. Electron. Gov. Int. J. 6(4), 343\u2013360 (2009)","journal-title":"Electron. Gov. Int. J."},{"key":"9_CR7","first-page":"177","volume":"2013","author":"V Cortier","year":"2013","unstructured":"Cortier, V., Galindo, D., Glondu, S., Izabachene, M., et al.: A generic construction for voting correctness at minimum cost-application to helios. IACR Cryptology ePrint Arch. 2013, 177 (2013)","journal-title":"IACR Cryptology ePrint Arch."},{"issue":"4","key":"9_CR8","doi-asserted-by":"crossref","first-page":"293","DOI":"10.3233\/FI-2010-351","volume":"104","author":"R Dapoigny","year":"2010","unstructured":"Dapoigny, R., Barlatier, P.: Modeling contexts with dependent types. Fundam. Inform. 104(4), 293\u2013327 (2010)","journal-title":"Fundam. Inform."},{"issue":"7","key":"9_CR9","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s12243-016-0525-8","volume":"71","author":"J Paul Gibson","year":"2016","unstructured":"Paul Gibson, J., Krimmer, R., Teague, V., Pomares, J.: A review of e-voting: the past, present and future. Ann. Telecommun. 71(7), 279\u2013286 (2016)","journal-title":"Ann. Telecommun."},{"key":"9_CR10","first-page":"91","volume-title":"Feature Interactions in Software and Communication Systems X","author":"J Paul Gibson","year":"2009","unstructured":"Paul Gibson, J., Lallet, E., Raffy, J.-L.: Feature interactions in a software product line for e-voting. In: Nakamura, M., Reiff-Marganiec, S. (eds.) Feature Interactions in Software and Communication Systems X, pp. 91\u2013106. IOS Press, Lisbon (2009)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Hoang, T.S., Furst, A., Abrial, J,-R.: Event-b patterns and their tool support. In: International Conference on Software Engineering and Formal Methods, pp. 210\u2013219 (2009)","DOI":"10.1109\/SEFM.2009.17"},{"key":"9_CR12","unstructured":"Kherroubi, S., M\u00e9ry, D.: Contextualisation et d\u00e9pendance en event-B. In: Idani, A., Kosmatov, N. (eds.) Approches Formelles dans l\u2019Assistance au D\u2019\u00e9veloppement de Logiciels, AFADL 2017 (2017)"},{"key":"9_CR13","volume-title":"Processes and Techniques","author":"G Kotonya","year":"1998","unstructured":"Kotonya, G., Sommerville, I., Engineering, R.: Processes and Techniques, 1st edn. Wiley Publishing, Hoboken (1998)","edition":"1"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186\u2013200. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-31987-0_14"},{"issue":"3","key":"9_CR15","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L Lamport","year":"1994","unstructured":"Lamport, L.: The temporal logic of actions. ACM Trans. Program. Lang. Syst. 16(3), 872\u2013923 (1994)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Leavens, G.T., Abrial, J.-R., Batory, D.S., Butler, M.J., Coglio, A., Fisler, K., Hehner, E.C.R., Jones, C.B., Miller, D., Peyton Jones, S.L., Sitaraman, M., Smith, D.R., Stump, A.: Roadmap for enhanced languages and methods to aid verification. In: GPCE, pp. 221\u2013236 (2006)","DOI":"10.1145\/1173706.1173740"},{"key":"9_CR17","unstructured":"McCarthy, J.: Notes on formalizing context. In: Proceedings of the 13th International Joint Conference on Artifical Intelligence - IJCAI 1993, pp. 555\u2013560, Morgan Kaufmann Publishers Inc, San Francisco (1993)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"M\u00e9ry, D., Poppleton, M.: Towards an integrated formal method for verification of liveness properties in distributed systems. Softw. Syst. Model. (SoSyM) (2015)","DOI":"10.1007\/s10270-015-0504-y"},{"key":"9_CR19","unstructured":"Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS). IEEE, August 2005"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60225-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T22:26:58Z","timestamp":1659047218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60225-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319602240","9783319602257"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60225-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}