Revisiting legal and regulatory requirements for secure e-voting

被引:0
|
作者
Mitrou, L [1 ]
Gritzalis, D [1 ]
Katsikas, S [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst, GR-83200 Samos, Greece
来源
SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES | 2002年 / 86卷
关键词
security; electronic voting; voting technologies; user requirements; legal requirements; secure information systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the democracy-oriented legal and constitutional requirements that an electronic voting system has to comply with. Its scope covers every election or decision-making process, which takes place through voting. Due mainly to the digital divide and to current technological limitation, electronic voting cannot be proposed as a universal means of voting but rather as an alternative option, supplemental to traditional voting means. An electronic voting process must be designed in such a way as to guarantee the general, free, equal and secret character of elections. In a democratic context an electronic voting system should respect and ensure attributes and properties such as transparency, verifiability, accountability, security and accuracy. Only then can it foster and promote the participation of the citizens, the legitimacy and the democratic transaction of the election process.
引用
收藏
页码:469 / 480
页数:12
相关论文
共 50 条
  • [31] An Efficient E2E Crowd Verifiable E-Voting System
    Zhang, Xinyu
    Zhang, Bingsheng
    Kiayias, Aggelos
    Zacharias, Thomas
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3607 - 3620
  • [32] An Extension of QSL for E-voting Systems
    Zhou, Yuan
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 87 - 96
  • [33] Universal access in e-voting for the blind
    Gilbert, Juan E.
    McMillian, Yolanda
    Rouse, Ken
    Williams, Philicity
    Rogers, Gregory
    McClendon, Jerome
    Mitchell, Winfred
    Gupta, Priyanka
    Mkpong-Ruffin, Idong
    Cross, E. Vincent, II
    UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2010, 9 (04) : 357 - 365
  • [34] Kleptographic attacks on e-voting schemes
    Gogolewski, Marcin
    Klonowski, Marek
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    Zagorski, Filip
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 494 - 508
  • [35] Analysis and design of e-voting protocol
    Jiang, SQ
    Feng, DG
    Qing, SH
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 281 - 290
  • [36] Blockchain Technology and Election Transparency: An Application of E-Voting Mechanism
    Singh, Vishal Kumar
    Keshari, Aditya
    Singh, Divya
    Singh, Pravin Chandra
    Gautam, Amit
    PACIFIC BUSINESS REVIEW INTERNATIONAL, 2024, 16 (08): : 35 - 43
  • [37] Analysis of Blockchain Solutions for E-Voting: A Systematic Literature Review
    Benabdallah, Ali
    Audras, Antoine
    Coudert, Louis
    El Madhoun, Nour
    Badra, Mohamad
    IEEE ACCESS, 2022, 10 : 70746 - 70759
  • [38] The Security and the Credibility Challenges in e-Voting Systems
    Rana, Ahmed
    Zincir, Ibrahim
    Basarici, Samsun
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 229 - 232
  • [39] An embedded e-voting machine with smart card
    Dichou, Karima
    Tourtchine, Victor
    Rahmoune, Faycal
    INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2016, 9 (4-5) : 291 - 298
  • [40] Heterogeneous Deniable Authentication for E-Voting Systems
    Jin, Chunhua
    Chen, Guanhua
    Yu, Changhui
    Zhao, Jianyang
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 41 - 54