A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces

  • Bernhard Beckert
  • Gerd Beuster
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4260)


We present a methodology for the formalization of human-computer interaction under security aspects. As part of the methodology, we give formal semantics for the well-known GOMS methodology for user modeling, and we provide a formal definition of an important aspect of human-computer interaction security. We show how formal GOMS models can be augmented with formal models of (1) the application and (2) the user’s assumptions about the application. In combination, this allows the pervasive formal modeling of and reasoning about secure human-computer interaction. The method is illustrated by a simple eVoting example.


User Model User Behavior Formal Semantic Linear Temporal Logic Automate Reasoning 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bramwell, C.: Formal development methods for interactive systems: Combining interactors and design rationale (1996)Google Scholar
  2. 2.
    de Haan, G.: ETAG: A Formal Model of Competence Knowledge for User-Interface Design. PhD thesis, Vrije Universiteit, Amsterdam (2000)Google Scholar
  3. 3.
    Dierstein, R.: Sicherheit in der Informationstechnik: Der Begriff IT-Sicherheit. Informatik Spektrum 27(4) (August 2004)Google Scholar
  4. 4.
    Dix, A., Abowd, G.: Modelling status and event behaviour of interactive systems. Software Engineering Journal 11(6), 334–346 (1996)CrossRefGoogle Scholar
  5. 5.
    Dix, A., Runciman, C.: Abstract models of interactive systems. In: Johnson, P., Cook, S. (eds.) HCI 1985: People and Computers I: Designing the Interface, pp. 13–22. Cambridge University Press, Cambridge (1985)Google Scholar
  6. 6.
    Doherty, G., Harrison, M.D.: A Representational Approach to the Specification of Presentations. In: Eurographics Workshop on Design Specification and Verification of Interactive Systems, DSVIS 1997, Granada, Spain (June 1997)Google Scholar
  7. 7.
    Duke, D., Barnard, P., Duce, D., May, J.: Systematic development of the human interface (1995)Google Scholar
  8. 8.
    Duke, D.J., Harrison, M.D.: A Theory of Presentations. In: Naftalin, M., Bertrán, M., Denvir, T. (eds.) FME 1994. LNCS, vol. 873, pp. 271–290. Springer, Heidelberg (1994)Google Scholar
  9. 9.
    Hamilton, F.: Predictive evaluation using task knowledge structures. In: Companion Proceedings of CHI 1996, Vancouver, Canada (1996)Google Scholar
  10. 10.
    John, B.E., Kieras, D.E.: The GOMS family of user interface analysis techniques: Comparison and contrast. ACM Transactions on Computer-Human Interaction 3(4), 320–351 (1996)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Bernhard Beckert
    • 1
  • Gerd Beuster
    • 1
  1. 1.Institute for Computer ScienceUniversity of Koblenz-Landau 

Personalised recommendations