Formal and semi-formal verification of a web voting system
Author:
Cristia Maximiliano,Frydman Claudia
Abstract
Purpose
– This paper aims to present the verification process conducted to assess the functional correctness of the voting system. Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) is the most important research institution in Argentina. It depends directly from Argentina’s President but its internal authorities are elected by around 8,000 research across the country. During 2011, the CONICET developed a Web voting system to replace the traditional mail-based process. In 2012 and 2014, CONICET conducted two Web election with no complaints from candidates and voters. Before moving the system into production, CONICET asked the authors to conduct a functional and security assessment of it.
Design/methodology/approach
– This process is the result of integrating formal, semi-formal and informal verification activities from formal proof to code inspection and model-based testing.
Findings
– Given the resources and time available, a reasonable level of confidence on the correctness of the application could be transmitted to senior management.
Research limitations/implications
– A formal specification of the requirements must be developed.
Originality/value
– Formal methods and semi-formal activities are seldom applied to Web applications.
Subject
Computer Networks and Communications,Information Systems
Reference51 articles.
1. Amálio, N.
,
Stepney, S.
and
Polack, F.
(2004), “Formal proof from UML models”, in Davies, J., Schulte, W. and Barnett, M. (Eds), 6th International Conference on Formal Engineering Methods, Seattle, WA, 8-12 November, pp. 418-433. 2. Amálio, N.
,
Stepney, S.
and
Polack, F.
(2006), “A formal template language enabling metaproof”, in
Misra, J.
,
Nipkow, T.
and
Sekerinski, E.
(Eds), 14th International Symposium on Formal Methods, Hamilton, 21-27 August, pp. 252-267. 3. Barnes, J.
,
Chapman, R.
,
Johnson, R.
,
Widmaier, J.
,
Cooper, D.
and
Everett, B.
(2006), “Engineering the Tokeneer enclave protection software”, Proceedings of the IEEE International Symposium on Secure Software Engineering, Washington, DC. 4. Bartetzko, D.
,
Fischer, C.
,
Möller, M.
and
Wehrheim, H.
(2001), “Jass – java with assertions”,
Electronic Notes in Theoretical Computer Science
, Vol. 55 No. 2, pp. 103-117. 5. Berdine, J.
,
Cook, B.
and
Ishtiaq, S.
(2011), “Slayer: memory safety for systems-level code”, in Gopalakrishnan, G. and Qadeer, S. (Eds), 23rd International Conference, Snowbird, UT, 14-20 July, pp. 178-183.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|