\begin{thebibliography}{10} \bibitem{dromey03} Dromey, R.G.: \newblock From requirements to design: Formalizing the key steps. \newblock In: Proc. of Software Engineering and Formal Methods (SEFM 2003), IEEE Computer Society (2003) 2--13 \bibitem{Dromey05} Dromey, R.G.: \newblock Genetic design: Amplifying our ability to deal with requirements complexity. \newblock In: Models, Transformations and Tools. Volume 3466 of LNCS., Springer (2005) 95--108 \bibitem{grunske05LYW} Grunske, L., Lindsay, P.A., Yatapanage, N., Winter, K.: \newblock An automated failure mode and effect analysis based on high-level design specification with behavior trees. \newblock In Romijn, J., Smith, G., van~de Pol, J., eds.: Proc. of Int Conf. on Integrated Formal Methods (IFM 2005). Volume 3771 of LNCS., Springer (2005) 129--149 \bibitem{Grunske08WY} Grunske, L., Winter, K., Yatapanage, N.: \newblock Defining the abstract syntax of visual languages with advanced graph grammars-a case study based on {Behavior Trees}. \newblock Journal of Visual Language and Computing \textbf{19}(3) (2008) 343--379 \bibitem{Colvin08GW} Colvin, R., Grunske, L., Winter, K.: \newblock Timed behavior trees for failure mode and effects analysis of time-critical systems. \newblock Journal of Systems and Software \textbf{81}(12) (2008) 2163--2182 \bibitem{BaiKat08} Baier, C., Katoen, J.P.: \newblock Principles of Model Checking. \newblock MIT Press (2008) \bibitem{Weis81} Weiser, M.: \newblock Program slicing. \newblock In: Proc. of Int. Conf. on Software Engineering (ICSE'81). (1981) 439--449 \bibitem{Tip95} Tip, F.: \newblock A survey of program slicing techniques. \newblock Journal of Programming Languages \textbf{3}(3) (1995) 121--189 \bibitem{Xu05} Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: \newblock A brief survey of program slicing. \newblock SIGSOFT Softw. Eng. Notes \textbf{30}(2) (2005) 1--36 \bibitem{Oda93} Oda, T., Araki, K.: \newblock Specification slicing in formal methods of software development. \newblock In: Proc. of Computer Software and Applications Conference (COMSAC 93), IEEE (2005) 313--319 \bibitem{WuYi04} Wu, F., Yi, T.: \newblock Slicing {Z} specifications. \newblock ACM SIGPLAN Notices \textbf{39}(8) (2004) 39--48 \bibitem{Heim97} Heimdahl, M., Whalen, M.: \newblock Reduction and slicing of heirarchical state machines. \newblock In Jazayeri, M., Schauer, H., eds.: Proc. of European Software Engineering Conference (ESEC/FSE 97). Volume 1301 of LNCS., Springer-Verlag (1997) 450--467 \bibitem{Korel03} Dorel, B., Singh, I., Tahat, L., Vaysburg, S.: \newblock Slicing of state-based models. \newblock In: Proc. of Int. Conf. on Software Maintenance (ICSM 2003), IEEE (2003) 34--43 \bibitem{HatDwy00} Hatcliff, J., Dwyer, M., Zheng, H.: \newblock Slicing software for model construction. \newblock Higher-Order and Symbolic Computation \textbf{13}(4) (2000) 315--353 \bibitem{Em90} Emerson, E.A.: \newblock Temporal and modal logic. \newblock In van Leeuwen, J., ed.: Handbook of Theoretical Coomputer Science. Volume~B. \newblock Elsevier Science Publishers (1990) \bibitem{Mill98} Millett, L., Teitelbaum, T.: \newblock Slicing promela and its applications to model checking, simulation and protocol understanding. \newblock In: Proc. of Int. SPIN Workshop. (1998) \bibitem{Gan99} Ganesh, V., Saidi, H., Shankar, N.: \newblock Slicing {SAL}. \newblock Technical report, Computer Science Laboratory (1999) \bibitem{thr08} Thrane, C.: \newblock Slicing for {UPPAAL}. \newblock In: Ann. IEEE Conf. (Student Paper), IEEE (2008) 1--5 \bibitem{LeLlOlSiTa08_236} Leuschel, M., Llorens, M., Olivier, J., Silva, J., Tamarit, S.: \newblock The {MEB} and {CEB} static analysis for {CSP} specifications. \newblock In Hanus, M., ed.: Proc. of Logic-Based Program Synthesis and Transformation (LOPSTR'08). Number 5438 in LNCS, Springer (2008) 103--118 \bibitem{BruWehr05} Br{\"u}ckner, I., Wehrheim, H.: \newblock Slicing an integrated formal method for verification. \newblock In: Formal Methods and Software Engineering. Volume 3785 of LNCS., Springer (2005) 360--374 \bibitem{wen04} Wen, L., Dromey, R.G.: \newblock From requirements change to design change: A formal path. \newblock In: Proc. of Int. Conf. on Software Engineering and Formal Methods (SEFM 2004), IEEE Computer Society (2004) 104--113 \bibitem{apsec07} Zafar, S., Colvin, R., Winter, K., Yatapanage, N., Dromey, R.G.: \newblock Early validation and verification of a distributed role-based access control model. \newblock In: Proc. of Asia-Pacific Software Engineering Conference (APSEC 2007), IEEE Computer Society (2007) 430--437 \bibitem{BTwebpage} Dromey, G.R.: \newblock Behavior {E}ngineering. \newblock http://www.behaviorengineering.org \bibitem{BTsemanticsCSPsigma} Colvin, R., Hayes, I.J.: \newblock A semantics for {Behavior Trees}. \newblock Technical Report SSE-2010-03, The University of Queensland (May 2010) \url{http://espace.library.uq.edu.au/view/UQ:204809}. \bibitem{Colvin09H} Colvin, R., Hayes, I.J.: \newblock Csp with hierarchical state. \newblock In Leuschel, M., Wehrheim, H., eds.: Proc. of Int. Conf. on Integrated Formal Methods (IFM 2009). Volume 5423 of LNCS., Springer (2009) 118--135 \bibitem{SAL2} de~Moura, L., Owre, S., Rue{\ss}, H., Rushby, J., Shankar, N., Sorea, M., Tiwari, A.: \newblock {SAL 2}. \newblock In Alur, R., Peled, D., eds.: Int. Conference on Computer-Aided Verification, ({CAV} 2004). Volume 3114 of LNCS., Springer (2004) 496--500 \bibitem{OttOtt84} Ottenstein, K.J., Ottenstein, L.M.: \newblock The program dependence graph in a software development environment. \newblock SIGSOFT Softw. Eng. Notes \textbf{9}(3) (1984) 177--184 \bibitem{FerOttWar87} Ferrante, J., Ottenstein, K.J., Warren, J.D.: \newblock The program dependence graph and its use in optimization. \newblock ACM Trans. Program. Lang. Syst. \textbf{9}(3) (1987) 319--349 \bibitem{RanAmt07} Ranganath, V.P., Amtoft, T., Banerjee, A., Hatcliff, J., Dwyer, M.B.: \newblock A new foundation for control dependence and slicing for modern program structures. \newblock ACM Trans. Program. Lang. Syst. \textbf{29}(5) (2007) ~27 \bibitem{Krin98} Krinke, J.: \newblock Static slicing of threaded programs. \newblock SIGPLAN Notices \textbf{33}(7) (1998) 35--42 \bibitem{Ever04} Evered, M., B{\"o}geholz, S.: \newblock A case study in access control requirements for a health information system. \newblock In: Proc. of Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. Volume~32., Australian Computer Society, Inc. (2004) 53--61 \end{thebibliography}