Modeling Faults to Improve Election Process Robustness

作者: Borislava I. Simidchieva , Sean Peisert , Lori Clarke , Sophie J. Engle , Alicia Clay Jones

DOI:

关键词: Fault tree analysisRobustness (computer science)Data miningStatic analysisComputer scienceProcess modelingCounting processSingle point of failureVotingBallot

摘要: This paper presents an approach for continuous process improvement and illustrates its application to improving the robustness of election processes. In this approach, Little-JIL definition language is used create a precise detailed model process. Given potential undesirable event, or hazard, fault tree automatically derived. Fault analysis then identify combinations failures that might allow selected hazard occur. Once these have been identified, we iteratively improve increase against those seem most likely We demonstrate Yolo County focus our on ballot counting what happens when discrepancy found during count. two single points failure (SPFs) in propose modifications show remove SPFs.

参考文章(38)
Costas Lambrinoudakis, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, Spyros Ikonomopoulos, Secure Electronic Voting: the Current Landscape Secure Electronic Voting. pp. 101- 122 ,(2003) , 10.1007/978-1-4615-0239-5_7
Sean Philip Peisert, Sidney Karin, A model of forensic analysis using goal-oriented logging University of California at San Diego. ,(2007)
Sean Peisert, Mark Graff, Matt Bishop, Candice Hoke, David Jefferson, E-voting and forensics: prying open the black box conference on electronic voting technology workshop on trustworthy elections. ,vol. 2009, pp. 3- 3 ,(2009)
Roy G. Saltman, M. S. M.P.A., Public Confidence and Auditability in Voting Systems Secure Electronic Voting. pp. 125- 137 ,(2003) , 10.1007/978-1-4615-0239-5_8
Rebecca T. Mercuri, Peter G. Neumann, Verification for Electronic Balloting Systems Secure Electronic Voting. pp. 31- 42 ,(2003) , 10.1007/978-1-4615-0239-5_3
Mohammad S. Raunak, Bin Chen, Amr Elssamadisy, Lori A. Clarke, Leon J. Osterweil, Definition and Analysis of Election Processes Software Process Change. ,vol. 3966, pp. 178- 185 ,(2006) , 10.1007/11754305_20
Indrajit Ray, Nayot Poolsapassit, Using Attack Trees to Identify Malicious Attacks from Authorized Insiders Computer Security – ESORICS 2005. pp. 231- 246 ,(2005) , 10.1007/11555827_14
W. Edwards Deming, Out of the Crisis ,(1982)
Borislava I. Simidchieva, Matthew S. Marzilli, Lori A. Clarke, Leon J. Osterweil, Specifying and verifying requirements for election processes digital government research. pp. 63- 72 ,(2008) , 10.5555/1367832.1367846
John Simpson, The Oxford English dictionary. Philosophy & Technology. ,vol. 26, pp. 341- 348 ,(2013) , 10.1007/S13347-013-0118-7