1. André Arnold, Gérald Point, Alain Griffault & Antoine Rauzy (1999): The AltaRica Formalism for Describing Concurrent Systems. Fundamenta Informaticae 40(2,3), pp. 109–124, doi:10.3233/FI-1999-402302. Available at
  2. Julien Brunel, David Chemouil, Nicolas Mélédo & Vincent Ibanez (2014): Formal Modelling and Safety Analysis of an Avionic Functional Architecture with Alloy. In: Embedded Real Time Software and Systems (ERTSS 2014), Toulouse, France.
  3. Daniel Jackson (2006): Software Abstractions: Logic, Language, and Analysis. The MIT Press.
  4. Amerson Lin, Mike Bond & Jolyon Clulow (2010): Modeling Partial Attacks with Alloy. In: Bruce Christianson, Bruno Crispo, JamesA. Malcolm & Michael Roe: Security Protocols, Lecture Notes in Computer Science 5964. Springer Berlin Heidelberg, pp. 20–33. Available at
  5. MarkC. Reynolds (2010): Lightweight Modeling of Java Virtual Machine Security Constraints. In: Marc Frappier, Uwe Glässer, Sarfraz Khurshid, Régine Laleau & Steve Reeves: Abstract State Machines, Alloy, B and Z, Lecture Notes in Computer Science 5977. Springer Berlin Heidelberg, pp. 146–159. Available at
  6. M. Toahchoodee & I. Ray (2009): Using alloy to analyse a spatio-temporal access control model supporting delegation. Information Security, IET 3(3), pp. 75–113, doi:10.1049/iet-ifs.2008.0074.

Comments and questions to:
For website issues: