Loading…

Electronic voting systems: security implications of the administrative workflow

With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the se...

Full description

Saved in:
Bibliographic Details
Main Authors: Lambrinoudakis, C., Kokolakis, S., Karyda, M., Tsoumas, V., Gritzalis, D., Katsikas, S.
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43
cites
container_end_page 471
container_issue
container_start_page 467
container_title
container_volume
creator Lambrinoudakis, C.
Kokolakis, S.
Karyda, M.
Tsoumas, V.
Gritzalis, D.
Katsikas, S.
description With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".
doi_str_mv 10.1109/DEXA.2003.1232067
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_1232067</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1232067</ieee_id><sourcerecordid>1232067</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</originalsourceid><addsrcrecordid>eNotkMtKAzEYRoMXcFp9AHGTF5j65564K3W8QKEbBXclzvzR6FzKJLb07Vuwqw_OgbP4CLllMGMM3P1j9TGfcQAxY1xw0OaMFFwYWwrH1DmZgNFOMeeEvSAFU9yVkll7RSYp_QAchRUFWVUt1nkc-ljT7ZBj_0XTPmXs0gNNWP-NMe9p7DZtrH2OQ5_oEGj-RuqbLvYx5fGIt0h3w_gb2mF3TS6DbxPenHZK3p-qt8VLuVw9vy7my7LmXOSyCcopzyVKMFxIhaiCb7TiDIKxRkoNFsAaY-oGXJBKo_hsHNPea6WCFFNy99-NiLjejLHz4359OkIcAEa6UL4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Electronic voting systems: security implications of the administrative workflow</title><source>IEEE Xplore All Conference Series</source><creator>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</creator><creatorcontrib>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</creatorcontrib><description>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</description><identifier>ISSN: 1529-4188</identifier><identifier>ISBN: 0769519938</identifier><identifier>ISBN: 9780769519937</identifier><identifier>EISSN: 2378-3915</identifier><identifier>DOI: 10.1109/DEXA.2003.1232067</identifier><language>eng</language><publisher>IEEE</publisher><subject>Electronic mail ; Electronic voting ; Electronic voting systems ; Informatics ; Internet ; Nominations and elections ; Protection ; Protocols ; Security ; Systems engineering and theory</subject><ispartof>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, 2003, p.467-471</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1232067$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,4050,4051,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1232067$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lambrinoudakis, C.</creatorcontrib><creatorcontrib>Kokolakis, S.</creatorcontrib><creatorcontrib>Karyda, M.</creatorcontrib><creatorcontrib>Tsoumas, V.</creatorcontrib><creatorcontrib>Gritzalis, D.</creatorcontrib><creatorcontrib>Katsikas, S.</creatorcontrib><title>Electronic voting systems: security implications of the administrative workflow</title><title>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings</title><addtitle>DEXA</addtitle><description>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</description><subject>Electronic mail</subject><subject>Electronic voting</subject><subject>Electronic voting systems</subject><subject>Informatics</subject><subject>Internet</subject><subject>Nominations and elections</subject><subject>Protection</subject><subject>Protocols</subject><subject>Security</subject><subject>Systems engineering and theory</subject><issn>1529-4188</issn><issn>2378-3915</issn><isbn>0769519938</isbn><isbn>9780769519937</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtKAzEYRoMXcFp9AHGTF5j65564K3W8QKEbBXclzvzR6FzKJLb07Vuwqw_OgbP4CLllMGMM3P1j9TGfcQAxY1xw0OaMFFwYWwrH1DmZgNFOMeeEvSAFU9yVkll7RSYp_QAchRUFWVUt1nkc-ljT7ZBj_0XTPmXs0gNNWP-NMe9p7DZtrH2OQ5_oEGj-RuqbLvYx5fGIt0h3w_gb2mF3TS6DbxPenHZK3p-qt8VLuVw9vy7my7LmXOSyCcopzyVKMFxIhaiCb7TiDIKxRkoNFsAaY-oGXJBKo_hsHNPea6WCFFNy99-NiLjejLHz4359OkIcAEa6UL4</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Lambrinoudakis, C.</creator><creator>Kokolakis, S.</creator><creator>Karyda, M.</creator><creator>Tsoumas, V.</creator><creator>Gritzalis, D.</creator><creator>Katsikas, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Electronic voting systems: security implications of the administrative workflow</title><author>Lambrinoudakis, C. ; Kokolakis, S. ; Karyda, M. ; Tsoumas, V. ; Gritzalis, D. ; Katsikas, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Electronic mail</topic><topic>Electronic voting</topic><topic>Electronic voting systems</topic><topic>Informatics</topic><topic>Internet</topic><topic>Nominations and elections</topic><topic>Protection</topic><topic>Protocols</topic><topic>Security</topic><topic>Systems engineering and theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Lambrinoudakis, C.</creatorcontrib><creatorcontrib>Kokolakis, S.</creatorcontrib><creatorcontrib>Karyda, M.</creatorcontrib><creatorcontrib>Tsoumas, V.</creatorcontrib><creatorcontrib>Gritzalis, D.</creatorcontrib><creatorcontrib>Katsikas, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lambrinoudakis, C.</au><au>Kokolakis, S.</au><au>Karyda, M.</au><au>Tsoumas, V.</au><au>Gritzalis, D.</au><au>Katsikas, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Electronic voting systems: security implications of the administrative workflow</atitle><btitle>14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings</btitle><stitle>DEXA</stitle><date>2003</date><risdate>2003</risdate><spage>467</spage><epage>471</epage><pages>467-471</pages><issn>1529-4188</issn><eissn>2378-3915</eissn><isbn>0769519938</isbn><isbn>9780769519937</isbn><abstract>With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building "voting protocols" that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention has been paid to the administrative part of an electronic voting system that supports the actors of the system. Possible "security gaps" in the administrative workflow may result in deteriorating the overall security level of the system, even if the voting protocol implemented by the system succeeds to fully comply with the security requirements set for voting. To this direction, this paper describes the responsibilities and privileges of the actors involved in the electronic voting process. The description of the role of each actor, together with the clear indication of what each actor is expected - and thus allowed - to do with the system, formulate an operational framework that complements the technological security features of the system and allows us to talk about "secure electronic voting systems".</abstract><pub>IEEE</pub><doi>10.1109/DEXA.2003.1232067</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1529-4188
ispartof 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, 2003, p.467-471
issn 1529-4188
2378-3915
language eng
recordid cdi_ieee_primary_1232067
source IEEE Xplore All Conference Series
subjects Electronic mail
Electronic voting
Electronic voting systems
Informatics
Internet
Nominations and elections
Protection
Protocols
Security
Systems engineering and theory
title Electronic voting systems: security implications of the administrative workflow
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T04%3A12%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Electronic%20voting%20systems:%20security%20implications%20of%20the%20administrative%20workflow&rft.btitle=14th%20International%20Workshop%20on%20Database%20and%20Expert%20Systems%20Applications,%202003.%20Proceedings&rft.au=Lambrinoudakis,%20C.&rft.date=2003&rft.spage=467&rft.epage=471&rft.pages=467-471&rft.issn=1529-4188&rft.eissn=2378-3915&rft.isbn=0769519938&rft.isbn_list=9780769519937&rft_id=info:doi/10.1109/DEXA.2003.1232067&rft_dat=%3Cieee_CHZPO%3E1232067%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c223t-df595a24e4072345ee5fad65210f78744608008777cd09f456e3bd916aa655f43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1232067&rfr_iscdi=true