scholarly journals An Integrated Application of Security Testing Methodologies to e-voting Systems

Author(s):  
Marco Ramilli ◽  
Marco Prandini
2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


2018 ◽  
Vol 6 (12) ◽  
pp. 553-557
Author(s):  
A. Punitha ◽  
D. Sukanya Bai ◽  
K. Lavanya
Keyword(s):  

Author(s):  
Matheus O. L. de Sá ◽  
Roberto Araujo ◽  
Alberto C. Lima Sobrinho ◽  
André Silva Neto ◽  
Gabriela S. Maximino ◽  
...  

2021 ◽  
Vol 54 (3) ◽  
pp. 1-28
Author(s):  
Jun Huang ◽  
Debiao He ◽  
Mohammad S. Obaidat ◽  
Pandi Vijayakumar ◽  
Min Luo ◽  
...  

Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency limitations. Hence, there has been a trend of moving to decentralized voting systems, such as those based on blockchain. The latter is a decentralized digital ledger in a peer-to-peer network, where a copy of the append-only ledger of digitally signed and encrypted transactions is maintained by each participant. Therefore, in this article, we perform a comprehensive review of blockchain-based voting systems and classify them based on a number of features (e.g., the types of blockchain used, the consensus approaches used, and the scale of participants). By systematically analyzing and comparing the different blockchain-based voting systems, we also identify a number of limitations and research opportunities. Hopefully, this survey will provide an in-depth insight into the potential utility of blockchain in voting systems and device future research agenda.


2013 ◽  
Vol 20 (3) ◽  
pp. 194-206
Author(s):  
Juan Gilbert ◽  
Jerone Dunbar ◽  
Alvitta Ottley ◽  
John Mark Smotherman

Sign in / Sign up

Export Citation Format

Share Document