Affiliation:
1. University of Massachusetts Amherst, MA
2. University of California at Davis, CA
3. University of Massachusetts Amherst and Raytheon BBN Technologies
4. University of California at Davis and Lawrence Berkeley National Laboratory
Abstract
In this article, we present an approach for systematically improving complex processes, especially those involving human agents, hardware devices, and software systems. We illustrate the utility of this approach by applying it to part of an election process and show how it can improve the security and correctness of that subprocess. We use the Little-JIL process definition language to create a precise and detailed definition of the process. Given this process definition, we use two forms of automated analysis to explore whether specified key properties, such as security and safety policies, can be undermined. First, we use model checking to identify process execution sequences that fail to conform to event-sequence properties. After these are addressed, we apply fault tree analysis to identify when the misperformance of steps might allow undesirable outcomes, such as security breaches. The results of these analyses can provide assurance about the process; suggest areas for improvement; and, when applied to a modified process definition, evaluate proposed changes.
Funder
National Science Foundation
National Institute for Standards and Technology
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference98 articles.
1. Usability of voter verifiable, end-to-end voting systems: Baseline data for Helios, prêt à voter, and scantegrity II;Acemyan Claudia Z.;USENIX Journal of Election Technology and Systems,2014
2. From error to error: Why voters could not cast a ballot and verify their vote with Helios, prêt à voter, and scantegrity II;Acemyan Claudia Z.;USENIX Journal of Election Technology and Systems,2015
3. State-Wide Elections, Optical Scan Voting Systems, and the Pursuit of Integrity
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献