Al-helali et al., 2010 - Google Patents
A secure electronic votingAl-helali et al., 2010
- Document ID
- 5177686086784696633
- Author
- Al-helali M
- Hameed W
- Publication year
- Publication venue
- Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements: E-Government Strategies and Advancements
External Links
Snippet
This chapter presents a security framework architecture for electronic voting that permits the avoidance of problems occasioned by interposing computer system and technical personnel between the voter and the electoral board. The architecture is based on replicating the …
- 230000003362 replicative 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Heiberg et al. | Verifiable internet voting in Estonia | |
| Karlof et al. | Cryptographic Voting Protocols: A Systems Perspective. | |
| Jacobs et al. | Electronic Voting in the Netherlands: from early Adoption to early Abolishment | |
| Anane et al. | E-voting requirements and implementation | |
| Riera et al. | Bringing confidence to electronic voting | |
| Schryen et al. | Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland | |
| Volkamer et al. | Measures to establish trust in internet voting | |
| Kulyk et al. | Human factors in coercion resistant internet voting–a review of existing solutions and open challenges | |
| Jorba et al. | Advanced security to enable trustworthy electronic voting | |
| Chaum et al. | Towards trustworthy elections: new directions in electronic voting | |
| Juvonen | A framework for comparing the security of voting schemes | |
| Reinhard et al. | Compliance of POLYAS with the BSI Protection Profile–Basic Requirements for Remote Electronic Voting Systems | |
| Joaquim et al. | Improving remote voting security with codevoting | |
| Al-helali et al. | A secure electronic voting | |
| Müller-Török et al. | Council of Europe Recommendation CM/Rec (2017) 5 and e-Voting Protocol Design | |
| Keshk et al. | Development of remotely secure e-voting system | |
| Schläpfer et al. | The secure platform problem taxonomy and analysis of existing proposals to address this problem | |
| Gerck | The witness-voting system | |
| Goirizelaia et al. | An optical scan e-voting system based on N-version programming | |
| Bagnato | The impact of the Council of Europe Recommendation CM/REC (2017) 5 on eVoting protocols | |
| Kekulandara | A Blockchain-based Auditable and Secure Voting System | |
| Forsythe | Encrypted receipts for voter-verified elections using homomorphic encryption | |
| Magonga | A Secure end to end verifiable e-voting system using cryptography: a case of Independent Electoral and Boundaries Commission of Kenya | |
| Schryen | Practical security of large-scale elections: An exploratory case study of internet voting in Estonia | |
| LAITOS | Digital Voting Systems |