Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes

Author:

Osterweil Leon J.1,Bishop Matt2,Conboy Heather M.1,Phan Huong1,Simidchieva Borislava I.3,Avrunin George S.1,Clarke Lori A.1,Peisert Sean4

Affiliation:

1. University of Massachusetts Amherst, MA

2. University of California at Davis, CA

3. University of Massachusetts Amherst and Raytheon BBN Technologies

4. University of California at Davis and Lawrence Berkeley National Laboratory

Abstract

In this article, we present an approach for systematically improving complex processes, especially those involving human agents, hardware devices, and software systems. We illustrate the utility of this approach by applying it to part of an election process and show how it can improve the security and correctness of that subprocess. We use the Little-JIL process definition language to create a precise and detailed definition of the process. Given this process definition, we use two forms of automated analysis to explore whether specified key properties, such as security and safety policies, can be undermined. First, we use model checking to identify process execution sequences that fail to conform to event-sequence properties. After these are addressed, we apply fault tree analysis to identify when the misperformance of steps might allow undesirable outcomes, such as security breaches. The results of these analyses can provide assurance about the process; suggest areas for improvement; and, when applied to a modified process definition, evaluate proposed changes.

Funder

National Science Foundation

National Institute for Standards and Technology

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference98 articles.

1. Usability of voter verifiable, end-to-end voting systems: Baseline data for Helios, prêt à voter, and scantegrity II;Acemyan Claudia Z.;USENIX Journal of Election Technology and Systems,2014

2. From error to error: Why voters could not cast a ballot and verify their vote with Helios, prêt à voter, and scantegrity II;Acemyan Claudia Z.;USENIX Journal of Election Technology and Systems,2015

3. State-Wide Elections, Optical Scan Voting Systems, and the Pursuit of Integrity

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Process Query Language: Design, Implementation, and Evaluation;Information Systems;2024-05

2. On using the Task Models for Validation and Evolution of Usable Security Design Patterns;Human Aspects of Information Security and Assurance;2023

3. Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education;Information Security Education for Cyber Resilience;2021

4. EcoKnow;Proceedings of the International Conference on Software and System Processes;2020-06-26

5. White Privilege and the Decolonization Work Needed in Evaluation to Support Indigenous Sovereignty and Self-Determination;Canadian Journal of Program Evaluation;2019-12-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3