Voting Systems Audit Log Study
نویسنده
چکیده
منابع مشابه
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...
متن کاملEvaluation of Elections Systems & Software (ES&S) Voting Equipment
In South Carolina, the ES&S voting systems include iVotronic direct recording electronic touch-screen voting machines, a Unity computer for each county, and Model 650 and Model 100 optical scan machines. A major difference between machines used in South Carolina and those tested in Ohio is that iVotronics in Ohio have an add-on paper tape, where the vote cast is recorded for use in a recount. T...
متن کاملAn Active Approach to Voting Verification
As our voting systems have come to rely more deeply on computer technology there have been great opportunities to improve the voting process, however, recently computer scientists and the general public have become wary of the amount of trust we place in the computers running our elections. Many proposals for audit systems to monitor our elections have been created. One popular audit system is ...
متن کاملRisk-limiting Audits for Nonplurality Elections
Many organizations have turned to alternative voting systems such as instant-runoff voting for determining the outcome of single-winner elections. It is our position in this paper that the increasing deployment of such alternative systems necessitate the study and development of risklimiting audits for these systems. We initiate this study. We examine several commonly used single-winner voting ...
متن کاملMitigating Coercion, Maximizing Confidence in Postal Elections
Elections have traditionally depended on procedural safeguards and best practices to ensure integrity and instill trust. By making it difficult for individuals to manipulate ballots undetected, these policies electoral malfeasance. Even so, it is clearly preferable to move beyond this kind of best-effort security and instead provide strong guarantees of integrity and privacy. An emerging litera...
متن کامل