Electronic Voting Systems: Security Implications of the Administrative Workflow
نویسندگان
چکیده
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building “voting protocols” that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible “security gaps” in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected and thus allowed to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about “secure electronic voting systems”.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملA Flexible Implementation of a Web-based Election System for Educational Organizations
Web-based on-line voting and on-line election systems provide benefits of usability, manageability and security. A particular workflow in any phase of on-line election process can be modeled and implemented securely by employing basic security applications readily provided by well established cryptographic technologies. By analyzing data-flow between different phases in the workflow, secure pro...
متن کاملIssues with Electronic Voting
This paper examines the various different types of electronic voting systems, and distinguishes between electronic machine voting and electronic distance voting. The prospects of electronic voting systems are unclear; this paper observes some of the risks and the costs that are associated with electronic voting systems. This paper discusses security requirements when using information communica...
متن کامل11 Electronic Voting : Developments , Trends , Challenges
This paper hopefully contributes to the discussion on what kind of electronic voting systems utilizing Internet technology we should be aiming at and what characteristics these systems should have. It provides an overview of the major constitutional and legal aspects of e-voting, together with their technical implications. It also discusses the security requirements and the system-wide properti...
متن کاملAn Inter-banking Auditing Security Solution for Detecting Unauthorised Financial Transactions entered by Authorised Insiders
the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions entered by authorised users. To address the problem, and based on the observation that all authorised interbanking financial transactions trigger or are triggered by other transactions in a workflow, we have developed a security solution ba...
متن کامل