Proceedings of the 6th International Conference on Electronic Commerce - ICEC '04 2004
DOI: 10.1145/1052220.1052288
|View full text |Cite
|
Sign up to set email alerts
|

Procedural security analysis of electronic voting

Abstract: Security is among the most important constraints in the implementation of electronic voting because, to date, commercially available technology does not provide a completely secure e-transaction environment. In this paper, we explore the issue of security of e-voting procedures, given the established limitations of technology. We examine security in the context of the increased complexity of multiple-channel voting, provided by a multiplicity of agents involved in the administration of eelections. As previousl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 9 publications
(12 reference statements)
0
9
0
Order By: Relevance
“…Thus, this work build upon the motivations for procedural security discussed in Xenakis and Macintosh (2004) and Xenakis and Macintosh (2005). Additionally, we believe that the outputs of the analyses could also be used to familiarize actors (e.g., election officials or polling officers) with the possible procedural threats and attacks that could happen during an election; thus, it complements works like Volkamer and McGaley (2007) and Volkamer (2009).…”
Section: Benefits Of the Approachmentioning
confidence: 90%
“…Thus, this work build upon the motivations for procedural security discussed in Xenakis and Macintosh (2004) and Xenakis and Macintosh (2005). Additionally, we believe that the outputs of the analyses could also be used to familiarize actors (e.g., election officials or polling officers) with the possible procedural threats and attacks that could happen during an election; thus, it complements works like Volkamer and McGaley (2007) and Volkamer (2009).…”
Section: Benefits Of the Approachmentioning
confidence: 90%
“…In this work, the authors used BPR to evaluate the introduction of an e-voting system in UK. They evaluated the underlying procedures with respect to possible risks through procedural security analysis [37], [38], also by highlighting (some of) the security implications of the administrative workflow (like [15]) in e-voting. However, their approach lack a machinery to systematically model and analysis the procedural alternatives nor provide precise notations for the redesigning activities.…”
Section: A Requirements Engineering and Bprmentioning
confidence: 99%
“…For instance, [21], [22] discuss risks and difficulties related to the introduction of e-voting, [23], [24] suggest possible improvements to existing procedures, and [25], [26], [27] introduce techniques to formally analyze what security breaches may be derived by executing the procedures in the wrong way.…”
Section: Related Workmentioning
confidence: 99%