2009 First International Workshop on Requirements Engineering for e-Voting Systems最新文献

筛选
英文 中文
Early Requirements for Mechanical Voting Systems 机械投票系统的早期要求
Douglas W. Jones
{"title":"Early Requirements for Mechanical Voting Systems","authors":"Douglas W. Jones","doi":"10.1109/RE-VOTE.2009.3","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.3","url":null,"abstract":"The problem of setting the requirements for voting systems is as old as democracy. With the advent of voting machinery in the 19th century, the problem became more difficult. In most cases, it was the technologists who set out to formally articulate requirements. In many cases, these are clearly stated, as such, in patent applications of the era. Sadly, some of these requirements have been repeatedly forgotten in subsequent years. By the early 20th century, several authors produced concise summaries of these requirements, but their efforts reflect strong vendor bias.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Specification of a Voting Service Provider 投票服务提供商规范
Axel Schmidt, L. Langer, J. Buchmann, M. Volkamer
{"title":"Specification of a Voting Service Provider","authors":"Axel Schmidt, L. Langer, J. Buchmann, M. Volkamer","doi":"10.1109/RE-VOTE.2009.8","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.8","url":null,"abstract":"Service Provider for remote electronic elections. [8] introduced the concept of the Voting Service Provider, a professional and qualified trusted third party which operates a secure remote electronic election on behalf of the election host. The intention is to release the election host of the complex operation of an electronic voting system thereby enabling secure and practical electronic elections. In this paper we consider a specific election scenario to specify a Voting Service Provider in detail. We show how its architecture and processes have to be set up in this scenario. We propose safeguards for the implementation of the security requirements towards the operational environment based on IT-Grundschutz. Our specification shows how to put the Voting Service Provider concept into practice. Additionally, it can be used as a basis for evaluation purposes.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116654018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Managing Requirements for E-Voting Systems: Issues and Approaches 管理电子投票系统的需求:问题和方法
Komminist Weldemariam, Andrea Mattioli, Adolfo Villafiorita
{"title":"Managing Requirements for E-Voting Systems: Issues and Approaches","authors":"Komminist Weldemariam, Andrea Mattioli, Adolfo Villafiorita","doi":"10.1109/RE-VOTE.2009.7","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.7","url":null,"abstract":"This paper discusses our approach and experiences on structuring and maintaining requirements for an e-voting system we have built and deployed for elections. Issues related to integrating laws and recommendation for e-voting systems, managing different elections and configurations, supporting a spiral development, yielded problems and approaches to help maintain integrity of requirements and a coherent view of the system. Moreover, the relationship between requirements and system architecture is based on finite state machines, that bridge the gap between the laws and the actual behavior of the machine.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126289312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Electronic Elections: Trust Through Engineering 电子选举:通过工程的信任
C. Schürmann
{"title":"Electronic Elections: Trust Through Engineering","authors":"C. Schürmann","doi":"10.1109/RE-VOTE.2009.4","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.4","url":null,"abstract":"It comes with many risks but brings also many benefits. Instead of flat out rejecting the technology as uncontrollably dangerous, we advocate in this paper a different technological angle that renders electronic elections trustworthy beyond the usual levels of doubt. We exploit the trust that voters currently have into the democratic process and model our techniques around that observation accordingly. In particular, we propose a technique of trace emitting computations to record the individual steps of an electronic voting machine for a posteriori validation on an acceptably small trusted computing base. Our technology enables us to prove that an electronic elections preserves the voter's intent, assuming that the voting machine and the trace verifier are independent.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121450283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Framework on the Security Requirements for Electronic Voting Protocols 电子投票协议安全要求框架研究
L. Langer, Axel Schmidt, J. Buchmann, M. Volkamer, Alexander Stolfik
{"title":"Towards a Framework on the Security Requirements for Electronic Voting Protocols","authors":"L. Langer, Axel Schmidt, J. Buchmann, M. Volkamer, Alexander Stolfik","doi":"10.1109/RE-VOTE.2009.9","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.9","url":null,"abstract":"Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Determine the Resilience of Evaluated Internet Voting Systems 确定评估的互联网投票系统的弹性
M. Volkamer, Rüdiger Grimm
{"title":"Determine the Resilience of Evaluated Internet Voting Systems","authors":"M. Volkamer, Rüdiger Grimm","doi":"10.1109/RE-VOTE.2009.2","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.2","url":null,"abstract":"Internet voting gets more and more popular. It is generally accepted that an Internet voting system needs to be evaluated. The existing evaluation frameworks try to be as system-independent as possible. Because of that distributed trust concepts like separation of duty for the voting servers, four eyes principle for administrators and the election commission, as well as the multiplicity of control functions like for the counting of votes cannot be demanded precisely. This article proposes to extend the evaluation of Internet voting systems by the computation of a so called k-resilience value. This value defines the robustness of a system and helps to identify vulnerabilities. Besides the introduction and discussion of this value, it is computed for existing Internet voting","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Improving Voting System Event Logs 改进投票系统事件日志
Andrea L. Mascher, P. Cotton, Douglas W. Jones
{"title":"Improving Voting System Event Logs","authors":"Andrea L. Mascher, P. Cotton, Douglas W. Jones","doi":"10.1109/RE-VOTE.2009.6","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.6","url":null,"abstract":"Federal standards require that electronic voting machines log information about the voting system behavior to support post-election audits and investigations. Our study examines what additional voter interaction information should be collected to allow investigation of human factors issues of the voting systems used in an election, while at the same time preserving voter privacy. We have focused on simulating touch screen interface errors that have been hypothesized as the cause of problems in past elections, such as miscalibration and insensitivity. The preliminary data gathered indicates that event logs which record voter interaction information may allow investigators to detect the existence of interface problems in deployed voting systems. This information can be collected without compromising secret ballot rights. We believe that any voting system using a touch screen interface could benefit by logging these events.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experiences Gained from the first Prêt à Voter Implementation 从第一次Prêt选民实施中获得的经验
D. Bismark, J. Heather, R. Peel, Steve A. Schneider, Zhe Xia, P. Ryan
{"title":"Experiences Gained from the first Prêt à Voter Implementation","authors":"D. Bismark, J. Heather, R. Peel, Steve A. Schneider, Zhe Xia, P. Ryan","doi":"10.1109/RE-VOTE.2009.5","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.5","url":null,"abstract":"Implementing an electronic voting system for the first time can be difficult, since requirements are sometimes hard to specify and keep changing, resources are scarce in an academic setting, the gap between theory and practice is wider than anticipated, adhering to a formal development lifecycle is inconvenient and delivery on time is very hard. This paper describes all of the work done by the Pr^et `a Voter team in the run-up to VoComp in 2007 and enumerates a number of lessons learned.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation 基于威胁树和蒙特卡罗模拟的投票系统风险评估模型
J. Pardue, J. Landry, Alec Yasinsac
{"title":"A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation","authors":"J. Pardue, J. Landry, Alec Yasinsac","doi":"10.1109/RE-VOTE.2009.1","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.1","url":null,"abstract":"There continues to be a requirement for better models, tools, and techniques for conducting risk assessment of voting systems. We propose a model of risk and a technique for risk assessment, which builds on threat trees and Monte Carlo simulation. The goal is to provide a means of facilitating informed decisions regarding voting system security standards through a rational and parsimonious quantification of intuition or estimation of risk. Such a means should support an evaluation of trade-offs, sensitivity analysis, cost-benefit analysis, and estimation of residual risk of current and proposed voting systems, technologies and controls.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信