2011
DOI: 10.1016/j.jss.2011.01.064
|View full text |Cite
|
Sign up to set email alerts
|

Procedural security analysis: A methodological approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 44 publications
0
8
0
Order By: Relevance
“…Work Brief description Requirement Engineering, e.g., [9], [10], [11], [12], [13] Contribute to the definition, development and structuring of requirements for e-voting systems with a clear separation between functional and non-functional requirements (e.g., audits log features) as well as the specifications for various hardware components' requirements. Business Process (Re)engineering, e.g., [14], [15], [16], [17], [18] Understand the effective implementation of e-voting procedures, namely by using BPR to understand what changes could be introduced to the conventional voting procedures to allow a safe and secure transition to electronic elections. Design & Implementation, e.g., [19], [20], [21], [22], [23], [24] Design of cryptographic schemes, protocols, and/or techniques to improve the design of voting systems or machines, as well as the actual implementation of the voting systems themselves.…”
Section: Classification Of the Development Trendsmentioning
confidence: 99%
See 3 more Smart Citations
“…Work Brief description Requirement Engineering, e.g., [9], [10], [11], [12], [13] Contribute to the definition, development and structuring of requirements for e-voting systems with a clear separation between functional and non-functional requirements (e.g., audits log features) as well as the specifications for various hardware components' requirements. Business Process (Re)engineering, e.g., [14], [15], [16], [17], [18] Understand the effective implementation of e-voting procedures, namely by using BPR to understand what changes could be introduced to the conventional voting procedures to allow a safe and secure transition to electronic elections. Design & Implementation, e.g., [19], [20], [21], [22], [23], [24] Design of cryptographic schemes, protocols, and/or techniques to improve the design of voting systems or machines, as well as the actual implementation of the voting systems themselves.…”
Section: Classification Of the Development Trendsmentioning
confidence: 99%
“…Here, the authors aimed at understanding the problematic trust/delegation relationships and eventually finding ways to adopt a solution to detect security properties violations at design time. Finally, a methodology based on formal notion specifically to support the procedural security analysis is discussed in [17].…”
Section: A Requirements Engineering and Bprmentioning
confidence: 99%
See 2 more Smart Citations
“…The majority of current proposals in the active research on security in the domain of BPM address either the analysis of security properties (e.g., [8,22]) or the augmentation of business process models with security requirement or control specifications (e.g., [6,7,23]). …”
Section: Related Workmentioning
confidence: 99%