<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1692-3324</journal-id>
<journal-title><![CDATA[Revista Ingenierías Universidad de Medellín]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. ing. univ. Medellín]]></abbrev-journal-title>
<issn>1692-3324</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Medellín]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1692-33242020000200119</article-id>
<article-id pub-id-type="doi">10.22395/rium.v19n37a6</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Proceso y evolución de los métodos formales en la ingeniería de requisitos]]></article-title>
<article-title xml:lang="en"><![CDATA[Process and evolution of formal methods in requirements engineering]]></article-title>
<article-title xml:lang="pt"><![CDATA[Processo e evolução dos métodos formais na engenharia de requisitos]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Suaza Jiménez]]></surname>
<given-names><![CDATA[Jorge Hernán]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lora Patiño]]></surname>
<given-names><![CDATA[Gloria Amparo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico Metropolitano Facultad de Ingeniería Grupo de Investigación Automática, Electrónica y Ciencias Computacionales]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Tecnológico Metropolitano  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<volume>19</volume>
<numero>37</numero>
<fpage>119</fpage>
<lpage>136</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1692-33242020000200119&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1692-33242020000200119&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1692-33242020000200119&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La ingeniería de requisitos se considera la fase más importante del ciclo de vida de los productos de software, porque en ella se especifican las necesidades de los clientes y es la base para la ejecución de las demás fases de la ingeniería de software. Los modelos que actualmente se utilizan para realizar la felicitación de requisitos se han propuesto y documentado de forma amplia, pero se centran solo en las técnicas para colectar información y descuidan la actividad de documentarla de manera adecuada. Además, para estructurar la especificación de requisitos sigue en uso el lenguaje natural como forma de comunicación y comprensión con el cliente. Debido a las ambigüedades que este causa, se dificulta la interpretación; esto conlleva reprocesos en las etapas posteriores del ciclo de vida del software. De acuerdo con ello, es necesario que las organizaciones desarrolladoras de software consideren formalizar el proceso de felicitación de requisitos si desean hacer más eficiente su proceso de desarrollo. En este artículo se hace una revisión de literatura para determinar el proceso y evolución de los métodos formales desde la perspectiva de la ingeniería de requisitos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Requirements Engineering is considered the most important phase of the life cycle of software products because it specifies the needs of the customers, and it is also the basis for the execution of the other phases of software engineering. The models currently used to perform the requirements elicitation have been proposed and widely documented, but they are focused only on the techniques to collect information, disregarding the activity of properly documenting this information. Moreover, to structure the requirements specification, natural language continues to be used as a means of communication and understanding with the customer. Due to the ambiguities caused by this language, its interpretation becomes difficult, and this leads to reprocesses in the later stages of the software life cycle. According to the above, it is necessary for software development organizations to consider formalizing the process of requirements elicitation if they wish to make their development process more efficient. A literature review is carried out in this paper to determine the process and evolution of the formal methods from the requirements engineering perspective.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo A engenharia de requisitos é considerada a fase mais importante do ciclo de vida dos produtos de software, porque nela se especificam as necessidades dos clientes e é a base para a execução das demais fases da engenharia de software. Os modelos que atualmente são utilizados para realizar a elicitação de requisitos foram propostos e documentados de forma ampla, mas se centram só nas técnicas para coletar informação e descuidam a atividade de documentar de maneira adequada. Além disso, para estruturar a especificação de requisitos segue em uso a linguagem natural como forma de comunicação e entendimento com o cliente. Devido às ambiguidades que este causa, dificulta-se a interpretação; isso implica reprocessos nas etapas posteriores do ciclo de vida do software. De acordo com isso, é necessário que as organizações desenvolvedoras de software considerem formalizar o processo de elicitação de requisitos se desejam tornar mais eficiente seu processo de desenvolvimento. Neste artigo, faz-se uma revisão de literatura para determinar o processo e a evolução dos métodos formais a partir da perspectiva da engenharia de requisitos.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[métodos formales]]></kwd>
<kwd lng="es"><![CDATA[ingeniería de requisitos]]></kwd>
<kwd lng="es"><![CDATA[calidad del software]]></kwd>
<kwd lng="es"><![CDATA[lenguaje matemático]]></kwd>
<kwd lng="en"><![CDATA[Formal methods]]></kwd>
<kwd lng="en"><![CDATA[requirements engineering]]></kwd>
<kwd lng="en"><![CDATA[software quality]]></kwd>
<kwd lng="en"><![CDATA[mathematic language]]></kwd>
<kwd lng="pt"><![CDATA[métodos formais]]></kwd>
<kwd lng="pt"><![CDATA[engenharia de requisitos]]></kwd>
<kwd lng="pt"><![CDATA[qualidade do software]]></kwd>
<kwd lng="pt"><![CDATA[linguagem matemática]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dahlstedt]]></surname>
<given-names><![CDATA[Å]]></given-names>
</name>
<name>
<surname><![CDATA[Persson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Requirements interdependencies - Moulding the state of research into a research agenda]]></article-title>
<source><![CDATA[Ninth International Workshop on Requirements Engineering Foundation for Software Quality (REFSQ 2003)]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Klagenfurt ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gore]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Diallo]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[The need for usable formal methods in verification and validation]]></source>
<year>2013</year>
<conf-name><![CDATA[ Winter Simulation Conference (WSC)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>Washington </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[The Role of Formal Methods in Software Engineering Education and Industry]]></source>
<year>1995</year>
<publisher-loc><![CDATA[Bristol ]]></publisher-loc>
<publisher-name><![CDATA[University of Bristol]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zave]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Classification of research efforts in requirements engineering]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>1997</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>315-21</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Métodos formales e Ingeniería de Software]]></article-title>
<source><![CDATA[Revista Virtual Universidad Católica del Norte]]></source>
<year>2010</year>
<numero>30</numero>
<issue>30</issue>
<page-range>158-84</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mathiassen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Munk-Madsen]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Formalization in systems development]]></source>
<year>1985</year>
<conf-name><![CDATA[ International Joint Conference on Theory and Practice of Software Development on Formal Methods and Software Development]]></conf-name>
<conf-loc>Berlín </conf-loc>
</nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vilkomir]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Bowen]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ghose]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formalization and assessment of regulatory requirements for safety-critical software]]></article-title>
<source><![CDATA[Innovations in Systems and Software Engineering]]></source>
<year>2006</year>
<volume>2</volume>
<numero>3-4</numero>
<issue>3-4</issue>
<page-range>165-78</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Webel]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Gotzhein]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formalization ofNetwork Quality-of-Service Requirements]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2007</year>
<volume>4574</volume>
<page-range>309-24</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schraps]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Peters]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Semantic annotation of a formal grammar by Semantic Patterns]]></source>
<year>2014</year>
<conf-name><![CDATA[ IEEE 4th International Workshop on Requirements Patterns (RePa)]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc>Karlskrona </conf-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chatterjee]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Johari]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Simplified and Corroborative Approach towards Formalization of Requirements]]></article-title>
<source><![CDATA[Communications in Computer and Information Science]]></source>
<year>2010</year>
<volume>94</volume>
<page-range>486-96</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cavada]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Cimatti]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Micheli]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[M]]></surname>
<given-names><![CDATA[Roveri]]></given-names>
</name>
<name>
<surname><![CDATA[Susi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Tonetta]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[OthelloPlay - A Plug-in based tool for requirement formalization and validation]]></source>
<year>2011</year>
<conf-name><![CDATA[ The 1st workshop on Developing tools as plug-ins - TOPI'11]]></conf-name>
<conf-loc>Honolulu </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Post]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hoenicke]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formalization and Analysis of Real-Time Requirements: A Feasibility Study at BOSCH]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2012</year>
<volume>7152</volume>
<page-range>225-40</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Horkoff]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Borgida]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Guizzardi]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Liuy]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Mylopoulos]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From Stakeholder Requirements to Formal Specifications Through Refinement]]></article-title>
<source><![CDATA[Requirements Engineering: Foundation for Software Quality]]></source>
<year>2015</year>
<volume>9013</volume>
<page-range>164-80</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ehrig]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Engels]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Orejas]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Wirsing]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Semi-Formal and Formal Specification Techniques for Software Systems]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Snook]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[UML-B: Formal Modeling and Design Aided by UML]]></article-title>
<source><![CDATA[ACM Transactions on Software Engineering and Methodology (TOSEM)]]></source>
<year>2006</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>92-122</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pandey]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Batra]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal methods in requirements phase of SDLC]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2013</year>
<volume>70</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>7-14</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La especificación formal en contexto: actual y futuro]]></article-title>
<source><![CDATA[Ingeniare - Revista Chilena de Ingeniería]]></source>
<year>2014</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>243-56</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krad]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal methods and automation for system verification]]></source>
<year>2011</year>
<conf-name><![CDATA[ Fourth International Conference on Modeling, Simulation and Applied Optimization (ICMSAO 2011)]]></conf-name>
<conf-date>2011</conf-date>
<conf-loc>Kuala Lumpur </conf-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Studying Formal Methods Applications in CBTC]]></source>
<year>2011</year>
<conf-name><![CDATA[ International Conference on Management and Service Science (MASS2011)]]></conf-name>
<conf-date>2011</conf-date>
<conf-loc>Bangkok </conf-loc>
</nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bollin]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Rauner-Reithmayer]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal specification comprehension: the art of reading and writing z]]></source>
<year>2014</year>
<conf-name><![CDATA[ The 2nd FME Workshop on Formal Methods in Software Engineering -FormaliSE 2014]]></conf-name>
<conf-loc>Hyderabad </conf-loc>
</nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolff]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Scrum goes formal: Agile methods for safety-critical systems]]></source>
<year>2012</year>
<conf-name><![CDATA[ First International Workshop on Formal Methods in Software Engineering: Rigorous and Agile Approaches (FormSERA)]]></conf-name>
<conf-date>2012</conf-date>
<conf-loc>Zurich </conf-loc>
</nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhavsar]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of Multiagent Based Interactive Grid Using Formal Methods - A Reliable Approach]]></source>
<year>2010</year>
<conf-name><![CDATA[ 3International Conference on Emerging Trends in Engineering and Technology]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Goa </conf-loc>
</nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Métodos formales: Perspectiva y aplicación futura]]></source>
<year>2011</year>
<conf-name><![CDATA[ IIIJornadas de Investigación de la Facultad de Ingenierías]]></conf-name>
<conf-loc> </conf-loc>
<page-range>64-8</page-range><publisher-loc><![CDATA[Medellín ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bishop]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Hay]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Nance]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Applying Formal Methods Informally]]></source>
<year>2011</year>
<conf-name><![CDATA[ 44Hawaii International Conference on System Sciences]]></conf-name>
<conf-date>2011</conf-date>
<conf-loc>Kauai </conf-loc>
</nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Sousa]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Viana]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Pavón]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic analysis of requirements consistency with the B method]]></article-title>
<source><![CDATA[ACMSIGSOFT Software Engineering Notes]]></source>
<year>2010</year>
<volume>35</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Based on Formal Methods in Trustable Software Requirements Engineering]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Conference on Internet Technology and Applications]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Wuhan </conf-loc>
</nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Eltoweissy]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Bohner]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[El-Kassas]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements]]></article-title>
<source><![CDATA[IET Software]]></source>
<year>2010</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>149-60</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Poll]]></surname>
<given-names><![CDATA[J. Van der]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal methods in software development: A road less travelled]]></article-title>
<source><![CDATA[South African Computer Journal]]></source>
<year>2010</year>
<volume>45</volume>
<page-range>165-78</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Patterh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal Specification of Common Criteria Based Access Control Policy Model]]></article-title>
<source><![CDATA[International Journal of Network Security]]></source>
<year>2010</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>139-48</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cimatti]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Roveri]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Susi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Tonetta]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formalization and Validation of Safety-Critical Requirements]]></article-title>
<source><![CDATA[Electronic Proceedings in Theoretical Computer Science]]></source>
<year>2010</year>
<volume>20</volume>
<page-range>68-75</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barringer]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Groce]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Havelund]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Entry Point for Formal Methods: Specification and Analysis of Event Logs]]></article-title>
<source><![CDATA[Electronic Proceedings in Theoretical Computer Science]]></source>
<year>2010</year>
<volume>20</volume>
<page-range>16-21</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Métodos formales aplicados en la industria del software]]></article-title>
<source><![CDATA[Temas de Ciencia y Tecnología]]></source>
<year>2011</year>
<volume>5</volume>
<numero>43</numero>
<issue>43</issue>
<page-range>3-12</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Alagar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Mohammad]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Specification and Verification of Context-dependent Services]]></article-title>
<source><![CDATA[Electronic Proceedings in Theoretical Computer Science]]></source>
<year>2011</year>
<volume>61</volume>
<page-range>17-33</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ammar]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Abdallah]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards the formal specification and verification of multi-agent-based systems]]></article-title>
<source><![CDATA[International Journal of Computer Science Issues]]></source>
<year>2011</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>200-10</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Gulati]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative study of two formal specification languages: Z-notation &amp; B-method]]></source>
<year>2012</year>
<conf-name><![CDATA[ The Second International Conference on Computational Science, Engineering and Information Technology - CCSEIT '12]]></conf-name>
<conf-loc>Coimbatore </conf-loc>
</nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[You]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Xia]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey on formal methods using in software development]]></source>
<year>2012</year>
<conf-name><![CDATA[ IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012)]]></conf-name>
<conf-loc>Shenzhen </conf-loc>
</nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barlas]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Koletsos]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Stefaneas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Extending standards with formal methods: Open Document Architecture]]></source>
<year>2012</year>
<conf-name><![CDATA[ International Symposium on Innovations in Intelligent Systems and Applications]]></conf-name>
<conf-date>2012</conf-date>
<conf-loc>Trabzon </conf-loc>
</nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bollin]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Do you speak Z? Formal methods under the perspective of a cross-cultural adaptation problem]]></source>
<year>2013</year>
<conf-name><![CDATA[ 1stFME Workshop on FormalMethods in Software Engineering (FormaliSE)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>San Francisco </conf-loc>
</nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Desafíos y Oportunidades de la Investigación en Métodos Formales]]></source>
<year>2011</year>
<conf-name><![CDATA[ XIIConferencia Iberoamericana en Sistemas, Cibernética e Informática]]></conf-name>
<conf-loc>Orlando </conf-loc>
</nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atlee]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Beidu]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Day]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faghih]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Shaker]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Recommendations for improving the usability of formal methods for product lines]]></source>
<year>2013</year>
<conf-name><![CDATA[ 1st FME Workshop on Formal Methods in Software Engineering (FormaliSE)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>San Francisco </conf-loc>
</nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Especificación formal - Presente y Futuro]]></source>
<year>2013</year>
<conf-name><![CDATA[ XVInternational Convention and Fair Informatica]]></conf-name>
<conf-loc>La Habana </conf-loc>
</nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Research on the Implementation of Internal Control in Enterprise Information System by Domain Analysis and Formal Methods: A Case Study of Sales Activities Internal Control Under Chinese Enterprise Environment]]></source>
<year>2013</year>
<conf-name><![CDATA[ Fourth World Congress on Software Engineering (WCSE 2013)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>Hong Kong </conf-loc>
</nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Hexel]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Wen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Rule-Based Behaviour Engineering: Integrated, Intuitive Formal Rule Modelling]]></source>
<year>2013</year>
<conf-name><![CDATA[ 22Australian Software Engineering Conference (ASWEC' 2013)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>Melbourne </conf-loc>
</nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noaman]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Alsmadi]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Jaradat]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The specifications of E-Commerce Secure System using Z language]]></article-title>
<source><![CDATA[The Research Bulletin of Jordan ACM]]></source>
<year>2013</year>
<volume>II</volume>
<numero>III</numero>
<issue>III</issue>
<page-range>127-31</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lockhart]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Purdy]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Wilsey]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal methods for safety critical system specification]]></source>
<year>2014</year>
<conf-name><![CDATA[ IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS)]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc>College Station </conf-loc>
</nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal Specification and Transformation Method of System Requirements from B Method to AADL Model]]></source>
<year>2014</year>
<conf-name><![CDATA[ IEEE 17th International Conference on Computational Science and Engineering (CSE 2014)]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc>Chengdu </conf-loc>
</nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Los Métodos Formales en Contexto]]></source>
<year>2014</year>
<conf-name><![CDATA[ XIIIConferencia Iberoamericana en Sistemas, Cibernética e Informática (CISCI 2014)]]></conf-name>
<conf-loc>Orlando </conf-loc>
</nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azeem]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ahsan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Minhas]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Noreen]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Specification of e-Health system using Z: A motivation to formal methods]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference for Convergence for Technology - 2014]]></conf-name>
<conf-loc>Pune </conf-loc>
</nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Sung]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[H]]></surname>
<given-names><![CDATA[Yuan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Specifying Complex Systems in Object-Z: A Case Study of Petrol Supply Systems]]></article-title>
<source><![CDATA[Journal of Software]]></source>
<year>2014</year>
<volume>9</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1707-17</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Perspectiva y Aplicación de los Métodos Formales]]></source>
<year>2014</year>
<conf-name><![CDATA[ XIIIConferencia Iberoamericana en Sistemas, Cibernética e Informática]]></conf-name>
<conf-loc>Orlando </conf-loc>
</nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jeffery]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Staples]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Andronick]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Klein]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Murray]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An empirical research agenda for understanding formal methods productivity]]></article-title>
<source><![CDATA[Information and Software Technology]]></source>
<year>2015</year>
<volume>60</volume>
<page-range>102-12</page-range></nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tamrakar]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparative Study and Performance Evaluation of Formal Specification Language based on Z, B and VDM Tools]]></article-title>
<source><![CDATA[International Journal of Scientific &amp; Engineering Research]]></source>
<year>2015</year>
<volume>6</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1540-3</page-range></nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Yadav]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B]]></article-title>
<source><![CDATA[International Journal of Computer Science and Information Technology]]></source>
<year>2015</year>
<volume>7</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>85-95</page-range></nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walter]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Rettberg]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kreutz]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards Formalized Model-Based Requirements for a Seamless Design Approach in Safety-Critical Systems Development]]></source>
<year>2015</year>
<conf-name><![CDATA[ IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc>Auckland </conf-loc>
</nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Los Métodos Formales en la Industria]]></article-title>
<source><![CDATA[Revista Antioqueña de las Ciencias Computacionales y la Ingeniería de Software (RACCIS)]]></source>
<year>2012</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>44-51</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
