Electronic voting systems: Security implications of the administrative workflow

被引:5
|
作者
Lambrinoudakis, C [1 ]
Kokolakis, S [1 ]
Karyda, M [1 ]
Tsoumas, V [1 ]
Gritzalis, D [1 ]
Katsikas, S [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Samos, Greece
关键词
D O I
10.1109/DEXA.2003.1232067
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems.".
引用
收藏
页码:467 / 471
页数:5
相关论文
共 50 条
  • [1] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235
  • [2] Understanding the security threats of electronic voting systems
    Wong, KF
    Cheng, CH
    Cheung, WM
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON E-BUSINESS (ICEB2002), 2002, : 634 - 638
  • [3] Security and accessibility: Concerns over electronic voting systems
    Yao, YR
    Watson, E
    ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 386 - 389
  • [4] Development of A Formal Security Model for Electronic Voting Systems
    Braeunlich, Katharina
    Grimm, Ruediger
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (02) : 1 - 28
  • [5] Research on Data and Workflow Security of Electronic Military Systems
    Wang, Wei
    Luo, Haining
    Deng, Huiyu
    PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2013, : 705 - 709
  • [6] Hack-a-vote: Security issues with electronic voting systems
    Bannet, J
    Price, DW
    Rudys, A
    Singer, J
    Wallach, DS
    IEEE SECURITY & PRIVACY, 2004, 2 (01) : 32 - 37
  • [7] New US bill to tighten security of electronic voting systems
    Schultz, E
    COMPUTERS & SECURITY, 2004, 23 (01) : 3 - 3
  • [8] An Experience in Testing the Security of Real-World Electronic Voting Systems
    Balzarotti, Davide
    Banks, Greg
    Cova, Marco
    Felmetsger, Viktoria
    Kemmerer, Richard A.
    Robertson, William
    Valeur, Fredrik
    Vigna, Giovanni
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (04) : 453 - 473
  • [9] Electronic Voting Machine with Enhanced Security
    Kadam, Shashank S.
    Choudhary, Ria N.
    Dandekar, Sujay
    Bardhan, Debjeet
    Vaidya, Namdeo B.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 403 - 406
  • [10] Definitions and Security of Quantum Electronic Voting
    Arapinis, Myrto
    Lamprou, Nikolaos
    Kashefi, Elham
    Pappa, Anna
    ACM TRANSACTIONS ON QUANTUM COMPUTING, 2021, 2 (01):