P167 - 4th International Conference on Electronic Voting 2010
Auflistung P167 - 4th International Conference on Electronic Voting 2010 nach Titel
1 - 10 von 21
Treffer pro Seite
Sortieroptionen
- Editiertes Buch
- KonferenzbeitragAnalysis of recommendation Rec(2004)11 based on the experiences of specific attacks against the first legally binding implementation of e-voting in Austria(4th International Conference on Electronic Voting 2010, 2010) Ehringfeld, Andreas; Naber, Larissa; Grechenig, Thomas; Krimmer, Robert; Traxl, Markus; Fischer, GeraldThis paper discusses the recommendation Rec(2004)11 of the Committee of Ministers to member states on legal, operational and technical standards for e-voting in light of the various attacks against the 2009 Austrian federation of students election. This election was the first instance of e-voting being implemented in a legally binding election in Austria. The question is if the recommendation published in 2004 is sufficient to handle real-world attacks against elections using e-voting. Based on the experience gained, several amendments to the recommendation are described.
- KonferenzbeitragCoercion-resistant hybrid voting systems(4th International Conference on Electronic Voting 2010, 2010) Spycher, Oliver; Haenni, Rolf; Dubuis, EricThis paper proposes hybrid voting systems as a solution for the vote buying and voter coercion problem of electronic voting systems. The key idea is to allow voters to revoke and overrule their electronic votes at the polling station. We analyze the potential and pitfalls of such revocation procedures and give concrete recommendations on how to build a hybrid system offering coercion-resistance based on this feature. Our solution may be of interest to governments, which aim at integrating paper-based and electronic voting systems rather than replacing the former by the latter.
- KonferenzbeitragCompliance of POLYAS with the common criteria protection profile - a 2010 Outlook on certified remote electronic voting(4th International Conference on Electronic Voting 2010, 2010) Menke, Niels; Reinhard, KaiIn 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection profile and worked toward fulfilling the given requirements. In this article we present the findings of the process of creating a compliant security target, necessary restrictions and assumptions to the system design as well as the workings of the committee, and architectural and procedural changes made necessary.
- KonferenzbeitragDouble-entry accounting provides software-independent algorithmfor confirming the integrity of automated election tallies(4th International Conference on Electronic Voting 2010, 2010) Verzola, Roberto S.This paper proposes the use of double-entry accounting to maintain the integrity of election data as they go through the processes of counting, canvassing, consolidation, and reporting. Double-entry accounting brings to election tallies its well-known benefits of minimizing errors, deterring fraud, and maintaining the integrity of large collections of numeric data. Its superiority to single-entry methods, which are currently in use in the electoral tallies of most countries, is universally acknowledged in business and is increasingly appreciated by governments. This paper describes how double-entry accounting can be applied to election tallies, proposes the equations that govern the accounting of ballots and votes, and discusses the advantages that this brings. It also responds to arguments that the method is not appropriate for election tallies.
- KonferenzbeitragE-voting in Japan: a developing case?(4th International Conference on Electronic Voting 2010, 2010) Iwasaki, MasahiroThis paper aims to introduce the current situation of electronic voting (e-voting) in Japan and discuss its challenges. E-voting has gradually spread in Japan. It has been used a total of twenty times by ten local governments since it was first introduced in 2002. Under the current law, e-voting can be used only for the election of the head of local government or council members. The paper first introduces the actual state of e-voting in Japan. Then the current status and challenges of the electronic voting system are analyzed based on data obtained from the experiences of Japanese cases. Finally, the paper discusses what challenges the Japanese e-voting has, and what could be given as prescriptions for them.
- KonferenzbeitragElectronic elections in a politicized polity(4th International Conference on Electronic Voting 2010, 2010) Hall, Thad; Loeber, LeontineSince the 2000 presidential elections, the evolution of electronic technologies in American elections-from voting machines to computerized voter registries-has occurred within the context of a highly partisan, polarized, and politicized environment. The decision about the type of voting systems to use within a given state has become especially political and these debates have affected the confidence and attitudes of voters toward various voting technologies. In the Netherlands, the debate even led to abolishing the use of all electronic technologies in elections. In this paper, we consider the evolution of voter confidence over this period and the evolution of the political debate that relates to electronic voting. We note that confidence in voting systems is affected by several factors, including race, partisanship, voting for a winning candidate, and the mode of voting (i.e., voting in person or voting via absentee ballot). During this time, certain factors, such as partisanship, have changed in importance based on previous election outcomes. On the issue of the importance of partisanship on confidence, we compare the United States and the Netherlands and the evaluation of electronic voting.
- KonferenzbeitragAn evaluation and certification approach to enable voting service providers(4th International Conference on Electronic Voting 2010, 2010) Schmidt, Axel; Volkamer, Melanie; Buchmann, JohannesIn this paper we provide an evaluation and certification approach for Voting Service Providers (VSPs) which combines the evaluation of the electronic voting system and the operational environment for the first time. The VSP is a qualified institution which combines a secure voting system and a secure operational environment to provide secure remote electronic elections as a service [La08]. This centralized approach facilitates legal regulation and evaluation. So far, a legal regulation framework for VSPs has been developed which demands evaluation and certification of the VSP [Sc09a]. Therefore the VSP is required to provide a security concept in which it demonstrates satisfaction of the security requirements defined in the legal regulation. However neither the content of this security concept nor an adequate evaluation methodology has been specified so far. We therefore developed a security concept template and a comprehensive evaluation methodology for the VSP, which includes both the voting system and operational environment of VSPs. Our proposal incorporates existing evaluation methodologies to facilitate evaluation and certification. With this paper and the legal regulation a realistic approach to enable the VSP concept is accomplished.
- KonferenzbeitragA formal IT-security model for the correction and abort requirement of electronic voting(4th International Conference on Electronic Voting 2010, 2010) Grimm, Rüdiger; Hupf, Katharina; Volkamer, MelanieThis paper addresses a basic security requirement of electronic voting, namely that a voter can correct or abort his vote at any time prior to his final vote casting. This requirement serves as a protection against voter precipitance (haste). We specify rules for a reset and cancel function that implement the correction and abort requirement. These rules are integrated in an extended version of the formal IT security model provided in [VG08]. We show that these rules do respect the requirements covered in this model namely that each voter can cast a vote, that no voter loses his voting right without having cast a vote and that only eligible voters can cast a vote. This paper formally describes and mathematically proves the model and finally shows at which places of a voting process the formal rules apply.
- KonferenzbeitragOverview(4th International Conference on Electronic Voting 2010, 2010) Krimmer, Robert; Grimm, Rüdiger
- «
- 1 (current)
- 2
- 3
- »