The Security Paradox, Disclosing Source Code to Attain Secure Electronic Elections
نویسندگان
چکیده
In recent years we have witnessed the amalgamation of government services and electronic systems. Citizens and state interactions have changed focus towards human centered electronic approaches, introducing citizens with electronic services that have simplified bureaucratic mechanisms and reduced response time. All efforts of implementing electronic governance have led to the next step in this process, digitalization of the decision making process, electronic voting. Electronic voting is an evolutionary step in the integration of electronic governments which will inevitably be introduced by all democracies across borders. This paper will view the opportunity of introducing electronic voting and explore the characteristics of such a system to provide a secure and trustworthy platform. Setting the field and clarifying disambiguation will result in viewing the critical issues involved in such a system. Transparency and audit ability may be one of the most decisive rudiments of such a system as it is directed in increasing citizen’s confidentiality ,focal point of this research is the selection involving the “disclosability” of e-voting system source code. Approaching the issue from information’s systems security perspective and taking into account relations with the open source initiative, it is evaluated that for electronic voting to harness the power of scientific review and secure coding, security must not depend on obscurity.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملTowards the impact of the operational environment on the security of e-voting
Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was focused on secure e-voting protocols. We show that the security of electronic elections requires a secure operational environment as well. We provide a comprehensive catalogue of organizational and technical requirements which...
متن کاملTowards secure online elections: models, primitives and open issues
Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be able to cast their votes through a web browser, from their home or any other location where they can get Internet access. This paper reviews the generic cryptographic models that have been proposed in the academic liter...
متن کاملSecure and Practical Online Elections via Voting Service Provider
Our paper deals with the question how remote e-voting can be put into practice in a secure and at the same time feasible way. We show that outsourcing the technical implementation of electronic elections to a Voting Service Provider (VSP) is one solution to this problem. Our concept can help election hosts to easily conduct electronic elections without having to take care of the necessary secur...
متن کاملA provably secure really source hiding designated verifier signature scheme based on random oracle model
A lot of designated verifier signature (DVS) schemes have been proposed. However, all of them only provide the basic security requirement that only the designated verifier can check the validity of the signature. They are either not secure enough or lacking source hiding. Hence, in this article, we design a provably secure DVS scheme. It not only can attain the basic security requirement but al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009