A Methodology for Assessing Procedural Security: A Case Study in E-Voting

نویسندگان

  • Komminist Weldemariam
  • Adolfo Villafiorita
چکیده

This paper presents a methodology for procedural security analysis in order to analyze and eventually try to make elections more secure. Our approach is based on modelling the electoral procedures in the form of business process models (which we write in a strict simplified subset of UML), systematically translate the models into executable formal specifications, and analyze the specifications against security properties. We believe such an analysis to be essential to identifying the limits of the current procedures (i.e. undetected attacks) and to identify more precisely under what hypotheses we can guarantee secure elections. This paper presents the approach and demonstrates with an example taken from the e-Voting procedures enacted within the ProVotE project, current trial of the Italian legislation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach

Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats may be carried out depending on the operational environment in which the system is used, i.e. the procedures that define how to operate the systems. We are interested in reasoning about the security of e-Voting procedur...

متن کامل

E-Voting as a Teaching Tool

Electronic voting systems are widely used in elections. This paper describes using an e-voting system as the basis for a project in an undergraduate computer security class. The goal of the project was to teach the students how to use the Flaw Hypothesis Methodology to perform a penetration study.

متن کامل

Assessing the sustainability of the pension system Case study: Social Security Organization

Introduction: Iranchr(chr(chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))39chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39'))))39chr(chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))39chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))))s social insurance system including 18 pension funds, which are part of the social protection system, covering about 68% of the wo...

متن کامل

Assessing the sustainability of the pension system Case study: Social Security Organization

Introduction: Iranchr(chr(chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))39chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39'))))39chr(chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))39chr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('39')))))s social insurance system including 18 pension funds, which are part of the social protection system, covering about 68% of the wo...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008