Loading…
Electronic voting systems: security implications of the administrative workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the se...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43 |
---|---|
cites | |
container_end_page | 471 |
container_issue | |
container_start_page | 467 |
container_title | |
container_volume | |
creator | Lambrinoudakis, C. Kokolakis, S. Karyda, M. Tsoumas, V. Gritzalis, D. Katsikas, S. |
description | With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems". |
doi_str_mv | 10.1109/DEXA.2003.1232067 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_1232067</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1232067</ieee_id><sourcerecordid>1232067</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</originalsourceid><addsrcrecordid>eNotkMtKAzEYRoMXcFp9AHGTF5j65564K3W8QKEbBXclzvzR6FzKJLb07Vuwqw_OgbP4CLllMGMM3P1j9TGfcQAxY1xw0OaMFFwYWwrH1DmZgNFOMeeEvSAFU9yVkll7RSYp_QAchRUFWVUt1nkc-ljT7ZBj_0XTPmXs0gNNWP-NMe9p7DZtrH2OQ5_oEGj-RuqbLvYx5fGIt0h3w_gb2mF3TS6DbxPenHZK3p-qt8VLuVw9vy7my7LmXOSyCcopzyVKMFxIhaiCb7TiDIKxRkoNFsAaY-oGXJBKo_hsHNPea6WCFFNy99-NiLjejLHz4359OkIcAEa6UL4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Electronic voting systems: security implications of the administrative workflow</title><source>IEEE Xplore All Conference Series</source><creator>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</creator><creatorcontrib>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</creatorcontrib><description>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</description><identifier>ISSN: 1529-4188</identifier><identifier>ISBN: 0769519938</identifier><identifier>ISBN: 9780769519937</identifier><identifier>EISSN: 2378-3915</identifier><identifier>DOI: 10.1109/DEXA.2003.1232067</identifier><language>eng</language><publisher>IEEE</publisher><subject>Electronic mail ; Electronic voting ; Electronic voting systems ; Informatics ; Internet ; Nominations and elections ; Protection ; Protocols ; Security ; Systems engineering and theory</subject><ispartof>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, 2003, p.467-471</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1232067$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,4050,4051,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1232067$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lambrinoudakis, C.</creatorcontrib><creatorcontrib>Kokolakis, S.</creatorcontrib><creatorcontrib>Karyda, M.</creatorcontrib><creatorcontrib>Tsoumas, V.</creatorcontrib><creatorcontrib>Gritzalis, D.</creatorcontrib><creatorcontrib>Katsikas, S.</creatorcontrib><title>Electronic voting systems: security implications of the administrative workflow</title><title>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings</title><addtitle>DEXA</addtitle><description>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</description><subject>Electronic mail</subject><subject>Electronic voting</subject><subject>Electronic voting systems</subject><subject>Informatics</subject><subject>Internet</subject><subject>Nominations and elections</subject><subject>Protection</subject><subject>Protocols</subject><subject>Security</subject><subject>Systems engineering and theory</subject><issn>1529-4188</issn><issn>2378-3915</issn><isbn>0769519938</isbn><isbn>9780769519937</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtKAzEYRoMXcFp9AHGTF5j65564K3W8QKEbBXclzvzR6FzKJLb07Vuwqw_OgbP4CLllMGMM3P1j9TGfcQAxY1xw0OaMFFwYWwrH1DmZgNFOMeeEvSAFU9yVkll7RSYp_QAchRUFWVUt1nkc-ljT7ZBj_0XTPmXs0gNNWP-NMe9p7DZtrH2OQ5_oEGj-RuqbLvYx5fGIt0h3w_gb2mF3TS6DbxPenHZK3p-qt8VLuVw9vy7my7LmXOSyCcopzyVKMFxIhaiCb7TiDIKxRkoNFsAaY-oGXJBKo_hsHNPea6WCFFNy99-NiLjejLHz4359OkIcAEa6UL4</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Lambrinoudakis, C.</creator><creator>Kokolakis, S.</creator><creator>Karyda, M.</creator><creator>Tsoumas, V.</creator><creator>Gritzalis, D.</creator><creator>Katsikas, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Electronic voting systems: security implications of the administrative workflow</title><author>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Electronic mail</topic><topic>Electronic voting</topic><topic>Electronic voting systems</topic><topic>Informatics</topic><topic>Internet</topic><topic>Nominations and elections</topic><topic>Protection</topic><topic>Protocols</topic><topic>Security</topic><topic>Systems engineering and theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Lambrinoudakis, C.</creatorcontrib><creatorcontrib>Kokolakis, S.</creatorcontrib><creatorcontrib>Karyda, M.</creatorcontrib><creatorcontrib>Tsoumas, V.</creatorcontrib><creatorcontrib>Gritzalis, D.</creatorcontrib><creatorcontrib>Katsikas, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lambrinoudakis, C.</au><au>Kokolakis, S.</au><au>Karyda, M.</au><au>Tsoumas, V.</au><au>Gritzalis, D.</au><au>Katsikas, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Electronic voting systems: security implications of the administrative workflow</atitle><btitle>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings</btitle><stitle>DEXA</stitle><date>2003</date><risdate>2003</risdate><spage>467</spage><epage>471</epage><pages>467-471</pages><issn>1529-4188</issn><eissn>2378-3915</eissn><isbn>0769519938</isbn><isbn>9780769519937</isbn><abstract>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</abstract><pub>IEEE</pub><doi>10.1109/DEXA.2003.1232067</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1529-4188 |
ispartof | 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, 2003, p.467-471 |
issn | 1529-4188 2378-3915 |
language | eng |
recordid | cdi_ieee_primary_1232067 |
source | IEEE Xplore All Conference Series |
subjects | Electronic mail Electronic voting Electronic voting systems Informatics Internet Nominations and elections Protection Protocols Security Systems engineering and theory |
title | Electronic voting systems: security implications of the administrative workflow |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T04%3A12%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Electronic%20voting%20systems:%20security%20implications%20of%20the%20administrative%20workflow&rft.btitle=14th%20International%20Workshop%20on%20Database%20and%20Expert%20Systems%20Applications,%202003.%20Proceedings&rft.au=Lambrinoudakis,%20C.&rft.date=2003&rft.spage=467&rft.epage=471&rft.pages=467-471&rft.issn=1529-4188&rft.eissn=2378-3915&rft.isbn=0769519938&rft.isbn_list=9780769519937&rft_id=info:doi/10.1109/DEXA.2003.1232067&rft_dat=%3Cieee_CHZPO%3E1232067%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1232067&rfr_iscdi=true |