Abstract
Electronic balloting systems are subject to a wide range of vulnerabilities thatresult in an inability to assure correctness in vote recording and tabulation. Risks that pertain to system design, misuse, and sociological factors are discussed in detail. Some standards that could assist in the design and testing of voting systems are cited. The difficulties in performing validation of fully computerized election equipment are described, with even greater concerns for Internet-based systems. A method whereby physical verifiability can be added to increase assurances of correctness is detailed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Saltman R., Accuracy, Integrity, and Security in Computerized VoteTallying, U.S. Dept. of Commerce, National Bureau of Standards, Special Publication 500–158, August 1988;http://www.nist.gov/itl/lab/specpubs/500-158.htm
Neumann P., Parker D., A Summary of Computer Misuse Techniques,Proc. of the 12 th National Computer Security Conference, October 1989;http://www.csl.sri.com/neumann/cs93.html
Thompson K., Reflections on Trusting Trust,Com. of the ACM, Vol. 27, No. 8, August 1984;http://www.acm.org/classics/sep95
Federal Election Commission,Voting System Standards, 2002;http://www.fec.gov/
IFES, UN-DESA, IDEA,Administration and Cost of Elections Project,1998–2000;http://www.aceproject.org
IEEE,Voting Equipment Standards, Project 1583, June 19, 2002;http://grouper.ieee.org/groups/scc38/1583
Common Criteria Implementation Board,Common Criteria for Information Security Evaluation, ISO IS 15408, 1999;http://csrc.nist.gov/cc
International Information Security Foundation,Generally-Accepted System Security Principles,June I997; http://web.mit.edu/security/www/GASSP/gassp021.html
Mercuri R., Physical Verifiability of Computer Systems,Proc. of the 5 th International Virus and Security Conference, March 1992;http://www.notablesoftware.com/evote.html
Schneier B.,Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this chapter
Cite this chapter
Mercuri, R.T., Neumann, P.G. (2003). Verification for Electronic Balloting Systems. In: Gritzalis, D.A. (eds) Secure Electronic Voting. Advances in Information Security, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0239-5_3
Download citation
DOI: https://doi.org/10.1007/978-1-4615-0239-5_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-4981-5
Online ISBN: 978-1-4615-0239-5
eBook Packages: Springer Book Archive