A model for system-based analysis of voting systems

N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a "system-based" view, i.e. considering interactions between the various components of a scheme [1,2]. Threat analysis has so far been of three main forms: system-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for system-based analysis of voting systems that is more systematic than previous work. The model is described in detail, and demonstrated with an example from a case study of the Randell-Ryan "Scratch Card" voting system [3]. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Tjøstheim, T., Peacock, T., & Ryan, P. Y. A. (2010). A model for system-based analysis of voting systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, pp. 114–130). https://doi.org/10.1007/978-3-642-17773-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free