Génie logiciel formel : théorie, pratique et pédagogie (apprentissage a partir de l'expérience du vote électronique). (Formal software engineering: theory, practice and teaching (learning from the E-voting experience))

This HDR is a summary of the last 20 years of my research career (since I started my PhD). It provides an overview of all my research activities. It focuses on my contributions to the domain of formal software engineering. With respect to fundamental theory, it reports on my work in the area of feature interactions and feature composition. To demonstrate my ability to apply research to real-world problems, it reports on my research on electronic voting. It then reports on my research into the symbiotic nature of research and teaching, with emphasis on formal methods and problem based learning. Finally, it puts forward a proposal for research into a software product line for e-voting systems, that combines theory, practice and education in a complementary manner

[1]  Richard A. Kemmerer,et al.  Formal Specification and Analysis of an E-voting System , 2010, 2010 International Conference on Availability, Reliability and Security.

[2]  Kenneth R. Iversen A Cryptographic Scheme for Computerized Elections , 1991, CRYPTO.

[3]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[4]  Kai R. T. Larsen,et al.  Voting technology implementation , 1999, CACM.

[5]  Moti Yung,et al.  Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.

[6]  André Zúquete,et al.  REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .

[7]  Jean-Raymond Abrial A System Development Process with Event-B and the Rodin Platform , 2007, ICFEM.

[8]  Bongshin Lee,et al.  Electronic voting system usability issues , 2003, CHI '03.

[9]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[10]  Peter Brent,et al.  The Australian ballot: Not the secret ballot , 2006 .

[11]  J. Paul Gibson Feature Requirements Models: Understanding Interactions , 1997, FIW.

[12]  Tomasz Janowski,et al.  Technological foundations of electronic governance , 2007, ICEGOV '07.

[13]  Klaus Schmid,et al.  PuLSE: a methodology to develop software product lines , 1999, SSR '99.

[14]  Deborah A. Frincke,et al.  Achieving Learning Objectives through E-Voting Case Studies , 2007, IEEE Security & Privacy.

[15]  Sean Riddle,et al.  An Analysis of the Hart Intercivic DAU eSlate , 2007, EVT.

[16]  Borislava I. Simidchieva,et al.  Specifying and verifying requirements for election processes , 2008, DG.O.

[17]  Zhe Xia,et al.  Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption , 2008, EVT.

[18]  Brian Randell,et al.  Voting Technologies and Trust , 2006, IEEE Security & Privacy.

[19]  Mark Ryan,et al.  Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[20]  James Withey Investment Analysis of Software Assets for Product Lines. , 1996 .

[21]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[22]  S. Dunne,et al.  Initial findings on the impact of an alternative approach to Problem Based Learning in Conputer Science , 2004 .

[23]  Ted Selker,et al.  The SAVE System — Secure Architecture for Voting Electronically , 2004 .

[24]  Donald R. Woods,et al.  Problem-based learning : how to gain the most from PBL , 1994 .

[25]  Dimitris Gritzalis Principles and requirements for a secure e-voting system , 2002 .

[26]  J. Paul Gibson Software reuse and plagiarism: a code of practice , 2009, ITiCSE '09.

[27]  Dominique Méry,et al.  Teaching Formal Methods: Lessons to Learn , 1998, IWFM.

[28]  J. Paul Gibson,et al.  Software engineering as a model of understanding for learning and problem solving , 2005, ICER '05.

[29]  Jan Bosch,et al.  Product-line architectures in industry: a case study , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[30]  Ann Macintosh,et al.  Procedural security in electronic voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[31]  Klaus Schmid,et al.  A Requirements-Based Taxonomy of Software Product Line Evolution , 2007, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[32]  Michael Poppleton,et al.  Towards Reuse with "Feature-Oriented Event-B" , 2008 .

[33]  Mark Guzdial,et al.  A multi-national, multi-institutional study of assessment of programming skills of first-year CS students , 2001, ITiCSE-WGR '01.

[34]  David Lorge Parnas,et al.  Basic Science for Software Developers , 2002 .

[35]  Jackie O’KELLY,et al.  YEAR ONE ANALYSIS — INTERPRETATION AND VALIDATION , 2005 .

[36]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[37]  Dan S. Wallach,et al.  Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.

[38]  Joseph Kiniry Formally Counting Electronic Votes (But Still Only Trusting Paper) , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).

[39]  Bongshin Lee,et al.  Early Appraisals of Electronic Voting , 2005 .

[40]  Jeannette M. Wing Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum , 2000, AMAST.

[41]  Ka-Ping Yee Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features , 2007, EVT.

[42]  David A. Wagner,et al.  Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[43]  Jürgen Börstler,et al.  Software product line modeling made practical , 2006, CACM.

[44]  Chao Zhang,et al.  Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records , 2008, IEEE Security & Privacy.

[45]  Josh Benaloh,et al.  Ballot Casting Assurance via Voter-Initiated Poll Station Auditing , 2007, EVT.

[46]  Lee Naish,et al.  Coercion-Resistant Tallying for STV Voting , 2008, EVT.

[47]  J. Paul Gibson E-Voting and the Need for Rigourous Software Engineering - The Past, Present and Future , 2007, B.

[48]  Marek Klonowski,et al.  Kleptographic Attacks on E-Voting Schemes , 2006, ETRICS.

[49]  Ralph Morelli,et al.  Teaching about the risks of electronic voting technology , 2005, ITiCSE '05.

[50]  Jing Liu Handling Safety-Related Feature Interaction in Safety-Critical Product Lines , 2007, 29th International Conference on Software Engineering (ICSE'07 Companion).

[51]  Naveen Sastry Designing Voting Machines for Verification , 2006, USENIX Security Symposium.

[52]  Leila Jemni Ben Ayed,et al.  Using UML Activity Diagrams and Event B for Distributed and Parallel Applications , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[53]  J. Paul Gibson E-Voting Requirements Modelling: An Algebraic Specification Approach (With CafeOBJ) , 2005 .

[54]  Michael Poppleton,et al.  Towards Feature-Oriented Specification and Development with Event-B , 2007, REFSQ.

[55]  Sarah P. Everett The usability of electronic voting machines and how votes can be changed without detection , 2007 .

[56]  Peter Y. A. Ryan,et al.  Prêt à Voter : a Systems Perspective , 2005 .

[57]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[58]  Timothy C. Bell,et al.  A low-cost high-impact computer science show for family audiences , 2000, Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518).

[59]  Lorrie Faith Cranor,et al.  Electronic voting: computerized polls may save money, protect privacy , 1996, CROS.

[60]  Tim Storer,et al.  Practical Remote Electronic Elections for the UK , 2004, PST.

[61]  H. Gardner,et al.  Frames of Mind: The Theory of Multiple Intelligences , 1983 .

[62]  Dan S. Wallach,et al.  Casting Votes in the Auditorium , 2007, EVT.

[63]  David Lorge Parnas,et al.  Software engineering programmes are not computer science programmes , 1999, Ann. Softw. Eng..

[64]  Dan Craigen,et al.  An International Survey of Industrial Applications of Formal Methods , 1992, Z User Workshop.

[65]  Jan Bosch,et al.  On the notion of variability in software product lines , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.

[66]  J. Paul Gibson,et al.  Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements , 2010, ISARCS.

[67]  David A. Wagner,et al.  Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.

[68]  Ariel J. Feldman,et al.  Security Analysis of the Diebold AccuVote-TS Voting Machine , 2007, EVT.

[69]  Kyo Chul Kang,et al.  Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .

[70]  James Heather,et al.  Implementing STV securely in Pret a Voter , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[71]  B. Bloom,et al.  Taxonomy of Educational Objectives. Handbook I: Cognitive Domain , 1966 .

[72]  Jörgen Svensson,et al.  E-voting in Europe: Divergent democratic practice , 2003, Inf. Polity.

[73]  Elspeth Cusack,et al.  Refinement, conformance and inheritance , 1991, Formal Aspects of Computing.

[74]  Douglas H. Clements,et al.  Constructivist Learning and Teaching , 2007 .

[75]  Joseph Lorenzo Hall Improving the Security, Transparency and Efficiency of California's 1% Manual Tally Procedures , 2008, EVT.

[76]  Daniel M. Zimmerman,et al.  Secret Ninja Formal Methods , 2008, FM.

[77]  Valtteri Niemi,et al.  Efficient Voting with No Selling of Votes , 1999, Theor. Comput. Sci..

[78]  J. Paul Gibson Formal requirements engineering: learning from the students , 2000, Proceedings 2000 Australian Software Engineering Conference.

[79]  Jean-Raymond Abrial,et al.  The B-book - assigning programs to meanings , 1996 .

[80]  Pierre-Yves Schobbens,et al.  Model checking lots of systems: efficient verification of temporal properties in software product lines , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.

[81]  Jim des Rivières,et al.  Eclipse: A platform for integrating development tools , 2004, IBM Syst. J..

[82]  Dermot Cochran,et al.  Formal techniques in a remote voting system , 2006, SOEN.

[83]  Joe McCarthy,et al.  Transparency and e-Voting: Democratic vs. Commercial Interests , 2004, Electronic Voting in Europe.

[84]  J. Paul Gibson,et al.  Feature Interactions in a Software Product Line for E-voting , 2009, ICFI.

[85]  J. Paul Gibson,et al.  NUIM-CS-TR 2003-02 E-voting : a safety critical system , 2003 .

[86]  Alec Yasinsac,et al.  The Dynamics of Counting and Recounting Votes , 2008, IEEE Security & Privacy.

[87]  David M. Weiss,et al.  Defining Families: The Commonality Analysis , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[88]  David Lorge Parnas,et al.  Software design , 2001 .

[89]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[90]  Byoungcheon Lee,et al.  Multiplicative Homomorphic E-Voting , 2004, INDOCRYPT.

[91]  E. Hilgard,et al.  Theories of Learning , 1981 .

[92]  Tim Storer,et al.  Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies , 2005, PST.

[93]  Ghassan Z. Qadah,et al.  Electronic voting systems: Requirements, design, and implementation , 2007, Comput. Stand. Interfaces.

[94]  Patrick Donohoe,et al.  Feature-Oriented Project Line Engineering , 2002, IEEE Softw..

[95]  J. Paul Gibson,et al.  Towards the development of a cognitive model of programming: a software engineering proposal , 2004, PPIG.

[96]  Aidan Mooney,et al.  An Overview of the Integration of Problem Based Learning into an existing Computer Science Programming Module , 2004 .

[97]  Warren D. Smith Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.

[98]  Bev Littlewood,et al.  E-voting: dependability requirements and design for dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[99]  Robert C. Martin Agile Software Development, Principles, Patterns, and Practices , 2002 .

[100]  Klaus Schmid,et al.  A systematic approach to derive the scope of software product lines , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[102]  Rebecca T. Mercuri A better ballot box , 2002 .

[103]  Aviel D. Rubin,et al.  Security considerations for remote electronic voting , 2002, CACM.

[104]  Josep Rifà,et al.  An implementable secure voting scheme , 1996, Comput. Secur..

[105]  John Paul Gibson Challenging the lecturer : learning from the teacher's mistakes , 2009 .

[106]  Lorrie Faith Cranor,et al.  Voting after Florida: no easy answers , 2001, UBIQ.

[107]  Kazue Sako,et al.  Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.

[108]  Nancy A. Lynch,et al.  Cryptographic protocols , 1982, STOC '82.

[109]  Dines Bjørner,et al.  Formal specification and software development , 1982 .

[110]  Marti A. Hearst,et al.  Building reliable voting machine software , 2007 .

[111]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[112]  Lorrie Faith Cranor,et al.  Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[113]  Antoni Diller,et al.  Z - an introduction to formal methods , 1990 .

[114]  Hwang Jing-Jang A conventional approach to secret balloting in computer networks , 1996 .

[115]  J. Paul Gibson,et al.  A Critical Analysis of the Council of Europe Recommendations on E-Voting , 2006, EVT.

[116]  Ann Macintosh,et al.  Procedural security analysis of electronic voting , 2004, ICEC '04.

[117]  Thomas P. Ryan,et al.  GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards , 2007, EVT.

[118]  Ann Macintosh,et al.  E-electoral administration: organizational lessons learned from the deployment of e-voting in the UK , 2005, DG.O.

[119]  Komminist Weldemariam,et al.  Modeling and Analysis of Procedural Security in (e)Voting: The Trentino's Approach and Experiences , 2008, EVT.

[120]  Aggelos Kiayias,et al.  Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[121]  Krzysztof Czarnecki,et al.  SAT-based analysis of feature models is easy , 2009, SPLC.

[122]  Rebecca T. Mercuri Florida 2002: sluggish systems, vanishing votes , 2002, CACM.

[123]  Michael J. Butler,et al.  A Roadmap for the Rodin Toolset , 2008, ABZ.

[124]  Mark Ryan,et al.  Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.

[125]  William S. Curran Teaching software engineering in the computer science curriculum , 2003, SGCS.

[126]  R. Tamblyn,et al.  Problem-based learning : an approach to medical education , 1980 .

[127]  Des Traynor,et al.  Implementing Cognitive Modellig in CS Education: Aligning Theory and Practice of Learning to Program , 2004, CELDA.

[128]  Merle S. King,et al.  Implementing voting systems: the Georgia method , 2004, CACM.

[129]  John Paul Gibson,et al.  Verification and maintenance of e-voting systems and standards , 2008 .

[130]  Alan H. Schoenfeld,et al.  Mathematical Problem Solving , 1985 .

[131]  Peter G. Neumann,et al.  Inside risks: risks in computerized elections , 1990, CACM.

[132]  Epp Maaten,et al.  Towards Remote E-Voting: Estonian case , 2004, Electronic Voting in Europe.

[133]  Michael J. Butler,et al.  An Open Extensible Tool Environment for Event-B , 2006, ICFEM.

[134]  Michael Poppleton,et al.  The Composition of Event-B Models , 2008, ABZ.

[135]  Peter G. Neumann Responsibilities of technologists , 2005, CACM.

[136]  Jean-Raymond Abrial,et al.  Refinement, Decomposition, and Instantiation of Discrete Models: Application to Event-B , 2007, Fundam. Informaticae.

[137]  Aggelos Kiayias,et al.  The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.

[138]  Ricky E. Sward,et al.  Learning styles across the curriculum , 2005, ITiCSE '05.

[139]  Jeremy Clark,et al.  Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.

[140]  J. Paul Gibson,et al.  RoboCode & problem-based learning: a non-prescriptive approach to teaching programming , 2006, ITICSE '06.

[141]  Susan Bergin,et al.  Automated assessment in CS1 , 2006 .

[142]  Michael J. Butler,et al.  Linking Event-B and Concurrent Object-Oriented Programs , 2008, Refine@FM.

[143]  Donald Gotterbarn E-voting: a failure of professionalism? , 2006, ACM SIGCSE Bull..

[144]  Armin Eberlein,et al.  Aspect-oriented requirements engineering for software product lines , 2003, 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. Proceedings..

[145]  Daniel Richardson,et al.  Better Voting Methods Through Technology: The Refinement-Manageability Trade-Off in the Single Transferable Vote , 2000 .

[146]  Michael Poppleton The Single Transferable Voting System: Functional Decomposition in Formal Specification , 1997, IWFM.

[147]  Chin-Ling Chen,et al.  The design of a secure anonymous Internet voting system , 2004, Comput. Secur..

[148]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[149]  Giovanni Vigna,et al.  Are your votes really counted?: testing the security of real-world electronic voting systems , 2008, ISSTA '08.

[150]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[151]  Dermot Cochran,et al.  Verification-Centric Realization of Electronic Vote Counting , 2007, EVT.

[152]  Arto Salomaa,et al.  Conducting secret ballot elections in computer networks: Problems and solutions , 1994, Ann. Oper. Res..

[153]  Fabio Martinelli,et al.  Mobile Implementation and Formal Verification of an e-Voting System , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[154]  Bruce Schneier,et al.  Insider risks in elections , 2004, CACM.

[155]  Allison Druin,et al.  The design of children's technology , 1998 .

[156]  David C. Sharp Component-based product line development of avionics software , 2000 .

[157]  Rop Gonggrijp,et al.  Studying the Nedap/Groenendaal ES3B Voting Computer: A Computer Security Perspective , 2007, EVT.

[158]  J. Paul Gibson Towards a Feature Interaction Algebra , 1998, FIW.

[159]  Robert Krimmer Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th, 2006 in Castle Hofen, Bregenz, Austria , 2006, Electronic Voting.

[160]  Pavol Cerný,et al.  Security Evaluation of ES&S Voting Machines and Election Management System , 2008, EVT.

[161]  Berry Schoenmakers Compensating for a lack of transparency , 2000, CFP '00.

[162]  Scott A. Smolka,et al.  Fundamental Results for the Verification of Observational Equivalence: A Survey , 1987, PSTV.

[163]  Colin F. Snook,et al.  Language and Tool Support for Class and State Machine Refinement in UML-B , 2009, FM.

[164]  Thomas W. Lauer The Risk of e-Voting , 2004 .

[165]  Ann Macintosh,et al.  Procedural Security and Social Acceptance in E-Voting , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[166]  Aggelos Kiayias,et al.  An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal , 2007, EVT.

[167]  Sylvia da Rosa Designing Algorithms in High School Mathematics , 2004, TFM.

[168]  Ronald Cramer,et al.  A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..

[169]  Michael J. Fischer,et al.  A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[170]  Seymour Papert,et al.  Mindstorms: Children, Computers, and Powerful Ideas , 1981 .

[171]  Gordon Harvey,et al.  Writing with Sources: A Guide for Students , 1998 .

[172]  Jens Groth Evaluating Security of Voting Schemes in the Universal Composability Framework , 2004, ACNS.

[173]  Michael J. Butler,et al.  Combining CSP and B for Specification and Property Verification , 2005, FM.

[174]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[175]  David Lorge Parnas,et al.  On the Design and Development of Program Families , 2001, IEEE Transactions on Software Engineering.

[176]  J. Paul Gibson A noughts and crosses Java applet to teach programming to primary school children , 2003, PPPJ.

[177]  Ken Robinson Embedding Formal Development in Software Engineering , 2004, TFM.

[178]  J. Paul Gibson,et al.  Weaving a Formal Methods Education with Problem-Based Learning , 2008, ISoLA.

[179]  L. Jean Camp,et al.  The code of elections , 2004, CACM.

[180]  Jim Buckley,et al.  Preliminary Study to Empirically Investigate the Comprehensibility of Requirements Specifications , 2005, PPIG.

[181]  Michael D. Byrne,et al.  Usability of voting systems: baseline data for paper, punch cards, and lever machines , 2007, CHI.

[182]  J. Paul Gibson,et al.  Synthesis and analysis of automatic assessment methods in CS1: generating intelligent MCQs , 2005, SIGCSE.

[183]  Dominique Cansell,et al.  Refinement: A Constructive Approach to Formal Software Design for a Secure e-voting Interface , 2007, Electron. Notes Theor. Comput. Sci..

[184]  Aggelos Kiayias,et al.  Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards , 2008, EVT.

[185]  Robert Laurence Baber The spine of software - designing provably correct software: theory and practice: or a mathematical introduction to the semantics of computer programs , 1986 .

[186]  Rebecca T. Mercuri,et al.  COTS and other electronic voting backdoors , 2006, CACM.

[187]  Colin F. Snook,et al.  UML-B: A Plug-in for the Event-B Tool Set , 2008, ABZ.

[188]  Melanie Volkamer,et al.  The Development of Remote E-Voting Around the World: A Review of Roads and Directions , 2007, VOTE-ID.

[189]  O. Cetinkaya,et al.  Verification and Validation Issues in Electronic Voting , 2007 .

[190]  Geoff W. Hamilton Composing fair objects , 2000 .

[191]  William Stallings,et al.  Data and Computer Communications , 1985 .

[192]  Ryan W. Gardner,et al.  On the Difficulty of Validating Voting Machine Software with Software , 2007, EVT.

[193]  S.G. Decker,et al.  Software Product Lines Beyond Software Development , 2007, 11th International Software Product Line Conference (SPLC 2007).

[194]  Georgios Theodoropoulos,et al.  e-Voting Requirements and Implementation , 2007, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007).

[195]  Eric Lallet,et al.  How Do I Know If My Design Is Correct ? , 2008 .

[196]  André Zúquete,et al.  Verifiable anonymous vote submission , 2008, SAC '08.

[197]  J. Paul Gibson,et al.  Analysis of a Distributed e-Voting System Architecture against Quality of Service Requirements , 2008, 2008 The Third International Conference on Software Engineering Advances.

[198]  Ben Riva,et al.  Bare-Handed Electronic Voting with Pre-processing , 2007, EVT.

[199]  C. Brainerd Piaget's theory of intelligence , 1978 .

[200]  Deepak Dhungana,et al.  Integrated Variability Modeling of Features and Architecture in Software Product Line Engineering , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).

[201]  Volha Bryl,et al.  Evaluating Procedural Alternatives in an e-Voting Domain: Lesson Learned , 2007 .

[202]  Ülle Madise,et al.  E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.

[203]  Bernd Carsten Stahl,et al.  Does Ontology Influence Technological Projects? The Case of Irish Electronic Voting , 2005, Wissensmanagement.

[204]  Valtteri Niemi,et al.  How to Prevent Buying of Votes in Computer Elections , 1994, ASIACRYPT.

[205]  C. Neville Dean,et al.  Teaching Formal Methods: CoLogNET/FME Symposium, TFM 2004, Ghent, Belgium, November 18-19, 2004. Proceedings (Lecture Notes in Computer Science) , 2004 .

[206]  David A. Wagner,et al.  Prerendered User Interfaces for Higher-Assurance Electronic Voting , 2006, EVT.

[207]  Patrick Traynor,et al.  Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST , 2008, EVT.

[208]  Jean-Marc Jézéquel,et al.  Modélisation de lignes de produits en UML , 2003, Obj. Logiciel Base données Réseaux.

[209]  Robert Balzer,et al.  Principles of good software specification and their implications for specification languages , 1981, AFIPS '81.

[210]  Radha Poovendran,et al.  A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..

[211]  Robert L. Nord,et al.  Software Product Lines , 2004, Lecture Notes in Computer Science.

[212]  John Paul Gibson Formal Methods : Never Too Young to Start , 2008 .

[213]  Dan S. Wallach,et al.  The Case for Networked Remote Voting Precincts , 2008, EVT.

[214]  Gilda Pour,et al.  The push to make software engineering respectable , 2000, Computer.

[215]  Michel Diaz,et al.  Formal Description Technique Estelle: Results of the Esprit Sedos Project , 1989 .

[216]  Dominique Cansell,et al.  Formal verification of tamper-evident storage for e-voting , 2007, Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007).

[217]  C. Andrew Neff,et al.  A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.

[218]  Ronald L. Rivest,et al.  Scratch & vote: self-contained paper-based cryptographic voting , 2006, WPES '06.