Introduction

This section contains a collection of assertion patterns that are generalized enough to be used in a wide range of protocols.