Toggle Main Menu Toggle Search

Open Access padlockePrints

A model for system-based analysis of voting systems

Lookup NU author(s): Thomas Tjostheim, Thea Peacock, Professor Peter Ryan

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a "system-based" view, i.e. considering interactions between the various components of a scheme [1,2]. Threat analysis has so far been of three main forms: system-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for system-based analysis of voting systems that is more systematic than previous work. The model is described in detail, and demonstrated with an example from a case study of the Randell-Ryan "Scratch Card" voting system [3]. © 2010 Springer-Verlag.


Publication metadata

Author(s): Ryan P; Peacock T; Tjøstheim T

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: Security Protocols: 15th International Workshop

Year of Conference: 2010

Pages: 114-130

ISSN: 0302-9743

Publisher: Springer

URL: http://dx.doi.org/10.1007/978-3-642-17773-6_13

DOI: 10.1007/978-3-642-17773-6_13

Library holdings: Search Newcastle University Library for this item

Series Title: Lecture Notes in Computer Science

ISBN: 3642177727


Share