The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2008 vol.6)
pp: 22-29
Alec Yasinsac , Florida State University
Matt Bishop , University of California at Davis
ABSTRACT
The limitations of current paper- and electronic-based voting systems and recount procedures can undermine the credibility of public elections. A corroborative, redundant voting system that performs vote counts via independent mechanisms at the polling place could address these shortcomings.
INDEX TERMS
Electronic Voting, system auditing, security, verification, VVPAT, paper trail, e-voting
CITATION
Alec Yasinsac, Matt Bishop, "The Dynamics of Counting and Recounting Votes", IEEE Security & Privacy, vol.6, no. 3, pp. 22-29, May/June 2008, doi:10.1109/MSP.2008.75
REFERENCES
1. D. Wagner, D. Jefferson, and M. Bishop, Security Analysis of the Diebold AccuBasic Interpreter, tech. report, Voting Systems Technology Assessment Advisory Board; www.ss.ca.gov/elections/voting_systemssecurity_analysis_of_the_diebold_accubasic_interpreter.pdf .
2. H. Hursti, "Security Alert: May 11, 2006, Critical Security Issues with Diebold TSx," Black Box Voting, www.blackboxvoting.orgBBVtsxstudy.pdf.
3. B. Cottrell, "Auditor's Study Finds Problems in Voter Database," Tallahassee Democrat,21 Jun. 2006.
4. G. Palast, "The Wrong Way to Fix the Vote," Washington Post,10 Jun. 2001, p. B01.
5. The Machinery of Democracy: Protecting Elections in an Electronic World, tech. report, Brennan Center Task Force on Voting System Security; www.brennancenter.org/dynamic/subpagesdownload_file_36343.pdf .
6. A. Yasinsac et al., Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware, Final Report, tech. report, Security and Assurance in Information Technology Lab., Florida State Univ., Feb. 2007; http://election.dos.state.fl.us/pdfFinalAudRepSAIT.pdf .
7. R. Gardner et al., Software Review and Security Analysis of the Diebold Voting Machine Software, tech. report, Security and Assurance in Information Technology Lab., Florida State Univ., Jul. 2007; http://election.dos.state.fl.us/pdfSAITreport.pdf .
8. T. Kohno et al., "Analysis of an Electronic Voting System," IEEE Symp. Security and Privacy, IEEE CS Press, 2004, pp. 27–40.
9. A.J. Feldman, J.A. Halderman, and E.W. Felten, "Security Analysis of the Diebold AccuVote-TS Voting Machine," Center for Information Technology Policy and Dept. of Computer Science, Princeton Univ., 13 Sept. 2006
10. H.G. Rice, "Classes of Recursively Enumerable Sets and Their Decision Problems," Trans. Amer. Mathematical Soc., vol. 74, no. 2, Mar. 1953, pp. 358–366.
11. A. Yasinsac and J.T. McDonald, "Foundations for Security Aware Software Development Education," Proc. 39th Ann. Hawaii Int'l Conf. System Sciences Track 9, IEEE CS Press, 2006, p. 219c.
12. "Judge Upholds Washington Governor's Election," USA Today,6 Jun. 2005.
13. B. Harris, "Election Recounting," The American Statistician, vol. 42, no. 1, Feb. 1988, pp. 66–68.
14. K.-P. Yee, "Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features," Proc. Usenix/Accurate Electronic Voting Technology Workshop, Usenix Assoc., 2007; http://usenix.org/events/evt07/tech/full_papers/ yeeyee.pdf.
15. N. Sastry, T. Kohno, and D. Wagner, "Designing Voting Machines for Verification," Proc. 15th Usenix Security Symp., Usenix Assoc., 2006, pp. 321–336.
16. J. Aslam, R. Popa, and R. Rivest, "On Estimating the Size and Confidence of a Statistical Audit," Proc. Usenix/Accurate Electronic Voting Technology Workshop, Usenix Assoc., 2007; http://usenix.org/events/evt07/tech/full_papers/ aslamaslam.pdf.
17. D. Sandler and D. Wallach, "Casting Votes in the Auditorium," Proc. Usenix/Accurate Electronic Voting Technology Workshop, Usenix Assoc., 2007; http://usenix.org/events/evt07/tech/full_papers/ sandlersandler.pdf.
18. K.-P. Yee, "Prerendered User Interfaces for Higher-Assurance Electronic Voting," Proc. Usenix/Accurate Electronic Voting Technology Workshop, Usenix Assoc., 2006; http://usenix.org/events/evt06/tech/full_papers/ yeeyee.pdf.
19. R.G. Saltman, "Independent Verification: Essential Action to Assure Integrity in the Voting Process," no. SB134106W0703, US Nat'l Inst. Standards and Technology, Aug. 2006; http://vote.nist.govSaltmanRpt20060815.pdf .
20. T. Selker, "Testimony on Voter Verification: Presentation to Senate Committee on Rules and Administration," working paper # 31, Voter Technology Project, 2005; www.vote.caltech.edu/media/documents/wps vtp_wp31.pdf.
21. S. Goggin and M. Byrne, "An Examination of the Auditability of Voter Verified Paper Audit Trail (VVPAT) Ballots," Proc. Usenix/Accurate Electronic Voting Technology Workshop, Usenix Assoc., 2007; www.usenix.org/events/evt07/tech/full_papers/ goggingoggin.pdf.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool