Skip to main content

Verification for Electronic Balloting Systems

  • Chapter

Part of the book series: Advances in Information Security ((ADIS,volume 7))

Abstract

Electronic balloting systems are subject to a wide range of vulnerabilities thatresult in an inability to assure correctness in vote recording and tabulation. Risks that pertain to system design, misuse, and sociological factors are discussed in detail. Some standards that could assist in the design and testing of voting systems are cited. The difficulties in performing validation of fully computerized election equipment are described, with even greater concerns for Internet-based systems. A method whereby physical verifiability can be added to increase assurances of correctness is detailed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Saltman R., Accuracy, Integrity, and Security in Computerized VoteTallying, U.S. Dept. of Commerce, National Bureau of Standards, Special Publication 500–158, August 1988;http://www.nist.gov/itl/lab/specpubs/500-158.htm

    Google Scholar 

  2. Neumann P., Parker D., A Summary of Computer Misuse Techniques,Proc. of the 12 th National Computer Security Conference, October 1989;http://www.csl.sri.com/neumann/cs93.html

    Google Scholar 

  3. Thompson K., Reflections on Trusting Trust,Com. of the ACM, Vol. 27, No. 8, August 1984;http://www.acm.org/classics/sep95

    Google Scholar 

  4. Federal Election Commission,Voting System Standards, 2002;http://www.fec.gov/

  5. IFES, UN-DESA, IDEA,Administration and Cost of Elections Project,1998–2000;http://www.aceproject.org

  6. IEEE,Voting Equipment Standards, Project 1583, June 19, 2002;http://grouper.ieee.org/groups/scc38/1583

  7. Common Criteria Implementation Board,Common Criteria for Information Security Evaluation, ISO IS 15408, 1999;http://csrc.nist.gov/cc

  8. International Information Security Foundation,Generally-Accepted System Security Principles,June I997; http://web.mit.edu/security/www/GASSP/gassp021.html

  9. Mercuri R., Physical Verifiability of Computer Systems,Proc. of the 5 th International Virus and Security Conference, March 1992;http://www.notablesoftware.com/evote.html

    Google Scholar 

  10. Schneier B.,Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer Science+Business Media New York

About this chapter

Cite this chapter

Mercuri, R.T., Neumann, P.G. (2003). Verification for Electronic Balloting Systems. In: Gritzalis, D.A. (eds) Secure Electronic Voting. Advances in Information Security, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0239-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-0239-5_3

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4981-5

  • Online ISBN: 978-1-4615-0239-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics