Verifying System-Level Security of a Smart Ballot Box

نویسندگان

چکیده

Event-B, a refinement-based formal modelling language, has traditionally focused on safety, but now increasingly finds new role in developing secure systems. In this paper we take fresh look at security and focus what means for the system rather than looking detailed protocols. We use Event-B proving from an abstract view refining it towards design details, focusing refinement of availability property system. define general approach to guarantee events by ensuring non-strengthening their guards, taking into consideration parameter types. illustrate our using smart ballot system, integral part modern voting

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Security Power of the Ballot Box

We show that any function f can be securely evaluated by a protocol with ballots and a ballot box. That is, n mutually suspicious players, each player i possessing a secret input xi, can use ballots and ballot boxes to jointly evaluate f(x1, . . . , xn) = (y1, . . . , yn), so that (no matter how many players may collude and deviate from their prescribed instructions, and no matter how long they...

متن کامل

Verifying Second-Level Security Protocols

A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of classical authentication protocols has become routine, but second-level protocols raise new challenges. These include the formalisation of appeals to the underlying protocols, the modification of the threat model, and the formalisat...

متن کامل

Verifying Operating System Security

A confined program is one which is unable to leak information to an unauthorized party or modify unauthorized resources. Confinement is an essential feature of any secure component-based system. This paper presents a proof of correctness of the EROS operating system architecture with respect to confinement. We give a formal statement of the requirements, construct a model of the architecture’s ...

متن کامل

A Digital Electronic Ballot Counter Box

Little or no technological advancement, geometric increase in population, and manual counting process has made a democratic system practiced by developing countries of the world inefficient, slow and unattractive. To move away from this system, technology must be adopted to automate democratic process of voting. This paper describes the design and implementation of a digital electronic ballot c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-77543-8_3