Electronic voting systems security requirements engineering

被引:0
|
作者
Daimi, K [1 ]
Wilson, C [1 ]
机构
[1] Univ Detroit Mercy, Dept Math & Comp Sci, Detroit, MI 48219 USA
关键词
electronic voting systems; requirements engineering; security requirements classification; software security requirements; security requirements process;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Voting is a critical process for democracy all over the world. Manual voting systems have been exercised for many years resulting in increased accumulated experience in solving voting problems. With electronic voting systems, security problems could be costly and disastrous if suitable, necessary and effective precautions are not enforced during the early stages of system engineering. In this paper, security requirements for voting systems are investigated, analyzed, and categorized to allow incorporating them into the software requirements engineering process. A classification based on the severity of the security requirement is also introduced.
引用
收藏
页码:230 / 235
页数:6
相关论文
共 50 条
  • [1] Electronic voting systems: Requirements, design, and implementation
    Qadah, Ghassan Z.
    Taha, Rani
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (03) : 376 - 386
  • [2] Understanding the security threats of electronic voting systems
    Wong, KF
    Cheng, CH
    Cheung, WM
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON E-BUSINESS (ICEB2002), 2002, : 634 - 638
  • [3] Security and accessibility: Concerns over electronic voting systems
    Yao, YR
    Watson, E
    [J]. ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 386 - 389
  • [4] Development of A Formal Security Model for Electronic Voting Systems
    Braeunlich, Katharina
    Grimm, Ruediger
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (02) : 1 - 28
  • [5] Electronic voting systems: Security implications of the administrative workflow
    Lambrinoudakis, C
    Kokolakis, S
    Karyda, M
    Tsoumas, V
    Gritzalis, D
    Katsikas, S
    [J]. 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 467 - 471
  • [6] A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
    Langer, Lucie
    Schmidt, Axel
    Buchmann, Johannes
    Volkamer, Melanie
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 475 - 480
  • [7] Hack-a-Vote: Security Issues with Electronic Voting Systems
    Rice University
    不详
    不详
    不详
    不详
    [J]. IEEE Secur. Privacy, 1600, 1 (32-37):
  • [8] Hack-a-vote: Security issues with electronic voting systems
    Bannet, J
    Price, DW
    Rudys, A
    Singer, J
    Wallach, DS
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (01) : 32 - 37
  • [9] New US bill to tighten security of electronic voting systems
    Schultz, E
    [J]. COMPUTERS & SECURITY, 2004, 23 (01) : 3 - 3
  • [10] An Experience in Testing the Security of Real-World Electronic Voting Systems
    Balzarotti, Davide
    Banks, Greg
    Cova, Marco
    Felmetsger, Viktoria
    Kemmerer, Richard A.
    Robertson, William
    Valeur, Fredrik
    Vigna, Giovanni
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (04) : 453 - 473