{"id":"https://openalex.org/W2792872986","doi":"https://doi.org/10.1093/comjnl/bxy018","title":"A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System","display_name":"A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System","publication_year":2018,"publication_date":"2018-02-16","ids":{"openalex":"https://openalex.org/W2792872986","doi":"https://doi.org/10.1093/comjnl/bxy018","mag":"2792872986"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy018","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy018","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018104205","display_name":"Khalifa Toumi","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210145102","display_name":"Institut Polytechnique de Paris","ror":"https://ror.org/042tfbd02","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Khalifa Toumi","raw_affiliation_strings":["Institut Mines-Telecom/Telecom SudParis, EVRY, France","Centre National de la Recherche Scientifique"],"affiliations":[{"raw_affiliation_string":"Institut Mines-Telecom/Telecom SudParis, EVRY, France","institution_ids":["https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"raw_affiliation_string":"Centre National de la Recherche Scientifique","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065541205","display_name":"Mohamed H.E. Aouadi","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]},{"id":"https://openalex.org/I4210145102","display_name":"Institut Polytechnique de Paris","ror":"https://ror.org/042tfbd02","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed Aouadi","raw_affiliation_strings":["Institut Mines-Telecom/Telecom SudParis, EVRY, France","Centre National de la Recherche Scientifique"],"affiliations":[{"raw_affiliation_string":"Institut Mines-Telecom/Telecom SudParis, EVRY, France","institution_ids":["https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"raw_affiliation_string":"Centre National de la Recherche Scientifique","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072274443","display_name":"Ana Cavalli","orcid":"https://orcid.org/0000-0003-2586-9071"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]},{"id":"https://openalex.org/I4210145102","display_name":"Institut Polytechnique de Paris","ror":"https://ror.org/042tfbd02","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ana R Cavalli","raw_affiliation_strings":["Institut Mines-Telecom/Telecom SudParis, EVRY, France","Centre National de la Recherche Scientifique"],"affiliations":[{"raw_affiliation_string":"Institut Mines-Telecom/Telecom SudParis, EVRY, France","institution_ids":["https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"raw_affiliation_string":"Centre National de la Recherche Scientifique","institution_ids":["https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084443011","display_name":"Wissam Mallouli","orcid":"https://orcid.org/0000-0003-2548-6628"},"institutions":[{"id":"https://openalex.org/I4210118939","display_name":"Montimage (France)","ror":"https://ror.org/02a8qtz61","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210118939"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Wissam Mallouli","raw_affiliation_strings":["Montimage, 39 rue Bobillot, Paris, France"],"affiliations":[{"raw_affiliation_string":"Montimage, 39 rue Bobillot, Paris, France","institution_ids":["https://openalex.org/I4210118939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106735305","display_name":"Jordi Puiggal Allepuz","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114268","display_name":"Scytl (Spain)","ror":"https://ror.org/024mfhp94","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210114268"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jordi Puiggal Allepuz","raw_affiliation_strings":["Scytl Secure Electronic Voting, S.A, Spain"],"affiliations":[{"raw_affiliation_string":"Scytl Secure Electronic Voting, S.A, Spain","institution_ids":["https://openalex.org/I4210114268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058067985","display_name":"Pol Valletb Montfort","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114268","display_name":"Scytl (Spain)","ror":"https://ror.org/024mfhp94","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210114268"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pol Valletb Montfort","raw_affiliation_strings":["Scytl Secure Electronic Voting, S.A, Spain"],"affiliations":[{"raw_affiliation_string":"Scytl Secure Electronic Voting, S.A, Spain","institution_ids":["https://openalex.org/I4210114268"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5018104205"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I205703379","https://openalex.org/I4210145102"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03924468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"61","issue":"8","first_page":"1109","last_page":"1122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8239604234695435},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.6895765662193298},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.66566401720047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6639464497566223},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.6395296454429626},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.5159714818000793},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5123122930526733},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5021522045135498},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.4207202196121216},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3399600684642792},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3318275213241577},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.30564409494400024},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1307559609413147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8239604234695435},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.6895765662193298},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.66566401720047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6639464497566223},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.6395296454429626},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.5159714818000793},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5123122930526733},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5021522045135498},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.4207202196121216},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3399600684642792},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3318275213241577},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30564409494400024},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1307559609413147},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/comjnl/bxy018","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy018","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-02017364v1","is_oa":false,"landing_page_url":"https://hal.science/hal-02017364","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"The Computer Journal, 2018, 61 (8), pp.1109 - 1122. &#x27E8;10.1093/comjnl/bxy018&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:HAL:hal-04476901v1","is_oa":false,"landing_page_url":"https://hal.science/hal-04476901","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 0010-4620","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W860782717","https://openalex.org/W1719871135","https://openalex.org/W1991949353","https://openalex.org/W2009923502","https://openalex.org/W2065850471","https://openalex.org/W2068121936","https://openalex.org/W2072059725","https://openalex.org/W2076723621","https://openalex.org/W2280393123","https://openalex.org/W2304212389","https://openalex.org/W6695471592"],"related_works":["https://openalex.org/W2953227786","https://openalex.org/W3189065608","https://openalex.org/W2164920192","https://openalex.org/W2092708554","https://openalex.org/W2065250680","https://openalex.org/W2125403566","https://openalex.org/W2120086576","https://openalex.org/W896362041","https://openalex.org/W2349271268","https://openalex.org/W2495229164"],"abstract_inverted_index":{"Testing":[0],"and":[1,38,53,123,187,192],"monitoring":[2,75],"the":[3,19,34,39,44,63,105,108,149,155,162,168,176],"effectiveness":[4],"of":[5,29,65,69,93,99,107,115,131,157,164,167,175],"security":[6,51,70,74,117,133,165],"policies":[7,71],"under":[8],"pervasive":[9,95],"system":[10],"architectures":[11],"is":[12,83,102,173],"still":[13],"a":[14,66,80,113,129,141],"major":[15],"challenging":[16],"problem":[17],"for":[18],"research":[20],"community":[21],"as":[22,24,33,90,120,125,127],"well":[23,126],"industrials.":[25],"The":[26,97],"inherent":[27],"characteristics":[28],"these":[30,94],"systems":[31,186],"such":[32,119],"heterogeneous":[35],"communicating":[36,185],"devices":[37],"multiple":[40],"used":[41],"technologies":[42],"make":[43,73],"burden":[45],"more":[46,77],"overwhelming":[47],"when":[48],"dealing":[49],"with":[50],"measures":[52,166],"policies.":[54],"This":[55,171],"paper":[56],"aims":[57],"to":[58,72,85,103,112,128,140,180,190],"bridge":[59],"this":[60],"gap":[61],"through":[62],"introduction":[64],"formal":[67,81],"design":[68],"operation":[76],"efficient.":[78],"Hence,":[79],"framework":[82,172],"proposed":[84],"actively":[86],"test":[87,191],"web-based":[88],"systems,":[89],"an":[91],"example":[92],"architectures.":[96],"goal":[98],"our":[100,158],"technique":[101,159],"check":[104],"compliance":[106],"targeted":[109,169],"web":[110],"application":[111,146],"set":[114,130],"generic":[116],"requirements":[118],"confidentiality,":[121],"integrity":[122],"availability":[124],"user-related":[132],"constraints.":[134],"Our":[135],"approach":[136],"has":[137],"been":[138],"applied":[139],"real":[142],"industrial":[143],"electronic":[144],"voting":[145],"provided":[147],"by":[148],"Scytl":[150],"company.":[151],"Several":[152],"experiments":[153],"show":[154],"merit":[156],"in":[160],"verifying":[161],"correctness":[163],"application.":[170],"part":[174],"INTER-TRUST":[177],"solution":[178],"intended":[179],"ensure":[181],"secure":[182],"inter-operation":[183],"between":[184],"provide":[188],"solutions":[189],"monitor":[193],"them.":[194]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
