IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Secure Electronic Voting

A Secure Electronic Voting
View Sample PDF
Author(s): Wamedh Wadood Abdoul Hameed (Al- Rafedain University, Iraq)
Copyright: 2011
Pages: 19
Source title: Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements
Source Author(s)/Editor(s): Abid Thyab Al Ajeeli (University of Bahrain, Bahrain)and Yousif A. Latif Al-Bastaki (University of Bahrain, Bahrain)
DOI: 10.4018/978-1-61520-789-3.ch032

Purchase

View A Secure Electronic Voting on the publisher's website for pricing and purchasing information.

Abstract

This chapter presents a security framework architecture for electronic voting that permits the avoidance of problems occasioned by interposing computer system and technical personnel between the voter and the electoral board. The architecture is based on replicating the conventional security mechanisms and in segregating all critical functions into very simple systems that are audited, monitored and physically secured. This security architecture minimizes the number of components that must be trusted to only two, namely, the software generating the encrypted ballot and the software opening the digital ballot boxes and the envelopes there in. This addresses one of the main causes of trouble in electronic voting systems, namely, the need to trust overly-complex systems like DREs, web browsers, operating systems or Internet servers.

Related Content

. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
Body Bottom