[go: up one dir, main page]

Al-helali et al., 2010 - Google Patents

A secure electronic voting

Al-helali et al., 2010

Document ID
5177686086784696633
Author
Al-helali M
Hameed W
Publication year
Publication venue
Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements: E-Government Strategies and Advancements

External Links

Snippet

This chapter presents a security framework architecture for electronic voting that permits the avoidance of problems occasioned by interposing computer system and technical personnel between the voter and the electoral board. The architecture is based on replicating the …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Heiberg et al. Verifiable internet voting in Estonia
Karlof et al. Cryptographic Voting Protocols: A Systems Perspective.
Jacobs et al. Electronic Voting in the Netherlands: from early Adoption to early Abolishment
Anane et al. E-voting requirements and implementation
Riera et al. Bringing confidence to electronic voting
Schryen et al. Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
Volkamer et al. Measures to establish trust in internet voting
Kulyk et al. Human factors in coercion resistant internet voting–a review of existing solutions and open challenges
Jorba et al. Advanced security to enable trustworthy electronic voting
Chaum et al. Towards trustworthy elections: new directions in electronic voting
Juvonen A framework for comparing the security of voting schemes
Reinhard et al. Compliance of POLYAS with the BSI Protection Profile–Basic Requirements for Remote Electronic Voting Systems
Joaquim et al. Improving remote voting security with codevoting
Al-helali et al. A secure electronic voting
Müller-Török et al. Council of Europe Recommendation CM/Rec (2017) 5 and e-Voting Protocol Design
Keshk et al. Development of remotely secure e-voting system
Schläpfer et al. The secure platform problem taxonomy and analysis of existing proposals to address this problem
Gerck The witness-voting system
Goirizelaia et al. An optical scan e-voting system based on N-version programming
Bagnato The impact of the Council of Europe Recommendation CM/REC (2017) 5 on eVoting protocols
Kekulandara A Blockchain-based Auditable and Secure Voting System
Forsythe Encrypted receipts for voter-verified elections using homomorphic encryption
Magonga A Secure end to end verifiable e-voting system using cryptography: a case of Independent Electoral and Boundaries Commission of Kenya
Schryen Practical security of large-scale elections: An exploratory case study of internet voting in Estonia
LAITOS Digital Voting Systems