Revisiting legal and regulatory requirements for secure e-voting

被引:0
|
作者
Mitrou, L [1 ]
Gritzalis, D [1 ]
Katsikas, S [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst, GR-83200 Samos, Greece
来源
SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES | 2002年 / 86卷
关键词
security; electronic voting; voting technologies; user requirements; legal requirements; secure information systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the democracy-oriented legal and constitutional requirements that an electronic voting system has to comply with. Its scope covers every election or decision-making process, which takes place through voting. Due mainly to the digital divide and to current technological limitation, electronic voting cannot be proposed as a universal means of voting but rather as an alternative option, supplemental to traditional voting means. An electronic voting process must be designed in such a way as to guarantee the general, free, equal and secret character of elections. In a democratic context an electronic voting system should respect and ensure attributes and properties such as transparency, verifiability, accountability, security and accuracy. Only then can it foster and promote the participation of the citizens, the legitimacy and the democratic transaction of the election process.
引用
收藏
页码:469 / 480
页数:12
相关论文
共 50 条
  • [21] The Future of E-voting in Australia
    Buckland, Richard
    Wen, Roland
    IEEE SECURITY & PRIVACY, 2012, 10 (05) : 25 - 32
  • [22] E-voting Attacks and Countermeasures
    Ibn Ziad, M. Tarek
    Al-Anwar, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 269 - 274
  • [23] Analysis of the Design Requirements for Remote Internet-Based E-Voting Systems
    Alamleh, Hosam
    AlQahtani, Ali Abdullah S.
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 386 - 390
  • [24] A Secure E-Voting System Based on RSA Time-Lock Puzzle Mechanism
    Chen, Hsing-Chung
    Deviani, Rini
    2012 SEVENTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2012), 2012, : 596 - 601
  • [25] Design of a Secured E-voting System
    Hussien, Hanady
    Aboelnaga, Hussien
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [26] The Need for Audit-Capable E-Voting Systems
    Mello-Stark, Suzanne
    Lamagna, Edmund A.
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 535 - 540
  • [27] The Technical Feasibility and Security of E-Voting
    Al-Ameen, Abdalla
    Talab, Samani
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (04) : 397 - 404
  • [28] Blockchain-Enabled E-Voting
    Kshetri, Nir
    Voas, Jeffrey
    IEEE SOFTWARE, 2018, 35 (04) : 95 - 99
  • [29] Universal access in e-voting for the blind
    Juan E. Gilbert
    Yolanda McMillian
    Ken Rouse
    Philicity Williams
    Gregory Rogers
    Jerome McClendon
    Winfred Mitchell
    Priyanka Gupta
    Idong Mkpong-Ruffin
    E. Vincent Cross
    Universal Access in the Information Society, 2010, 9 : 357 - 365
  • [30] E-Voting Indonesia: Framing the research
    Hapsara, Manik
    PROCEEDINGS OF THE 2014 9TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2014), 2014,