CSci 5271 Introduction to Computer Security Day 24: Electronic voting

نویسنده

  • Stephen McCamant
چکیده

Outline Usability and security (cont' d) Elections and their security Announcements intermission System security of electronic voting Exercise sets 2 and 3 debrief Cryptography for voting Trusted UI Tricky to ask users to make trust decisions based on UI appearance Lock icon in browser, etc. Attacking code can draw lookalike indicators Lock favicon Picture-in-picture attack Smartphone app permissions Smartphone OSes have more fine-grained per-application permissions Access to GPS, microphone Access to address book Make calls Phone also has more tempting targets Users install more apps from small providers Permissions manifest Android approach: present listed of requested permissions at install time Can be hard question to answer hypothetically Users may have hard time understanding implications User choices seem to put low value on privacy Time-of-use checks iOS approach: for narrower set of permissions, ask on each use Proper context makes decisions clearer But, have to avoid asking about common things iOS app store is also more closely curated

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Issues with Electronic Voting

This paper examines the various different types of electronic voting systems, and distinguishes between electronic machine voting and electronic distance voting. The prospects of electronic voting systems are unclear; this paper observes some of the risks and the costs that are associated with electronic voting systems. This paper discusses security requirements when using information communica...

متن کامل

Acceptance of Voting Technology: Between Confidence and Trust

Social aspects of security of information systems are often discussed in terms of “actual security” and “perceived security”. This may lead to the hypothesis that e-voting is controversial because in paper voting, actual and perceived security coincide, whereas they do not in electronic systems. In this paper, we argue that the distinction between actual and perceived security is problematic fr...

متن کامل

Secure Electronic Voting with Cryptography

In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013