skip to main content
article
Free access

Fixing federal e-voting standards

Published: 01 March 2007 Publication History

Abstract

Without a threat model and a system model, voting standards cannot ensure the integrity or accuracy of the voting process.

References

[1]
Dill, D. Electronic voting: An overview of the problem. Talk presented to the Carter-Baker Commission on Federal Election Reform, Washington, D.C. (Apr. 18, 2005); www.verifiedvotingfoundation.org/article.php?id=5731.
[2]
Feldman, A., Halderman, J., and Felten, E. Security Analysis of the Diebold AccuVote-TS Voting Machine. Center for Information Technology Policy, Princeton University, Princeton, NJ (Sept. 13, 2006); itpolicy.princeton.edu/voting/.
[3]
Horn, D. The Obfuscated V Contest (Nov. 2, 2004); graphics.stanford.edu/~danielrh/vote/vote.html.
[4]
Hursti, H. Diebold TSx Evaluation. Black Box Voting, Renton, WA (May 11, 2006); www.blackboxvoting.org/BBVtsxstudy.pdf.
[5]
RABA Innovative Solution Cell. Trusted Agent Report: Diebold AccuVote-TS Voting System. RABA Technologies, Columbia, MD (Jan. 20, 2004); www.raba.com/press/TA_Report_AccuVote.pdf.
[6]
Rubin, A. CS600.443 Project 2. Department of Computer Science, Johns Hopkins University, Baltimore, MD (Mar. 27, 2004); www.cs.jhu.edu/~rubin/courses/sp04/proj2.txt, 2004.
[7]
Saltman, R. Accuracy, integrity, and security in computerized vote-tallying. Commun. ACM 31, 10 (Oct. 1988), 1184--1191.
[8]
Simons, B. A response to: The League of Women Voters of the U.S. questions and answers on direct recording electronic (DRE) voting systems (2004); www.leagueissues.org/lwvqa.html.
[9]
Thompson, K. Reflections on trusting trust. Commun. ACM 27, 8 (Aug. 1984), 761--763.
[10]
Wallach, D. CS523 Hack-A-Vote Project. Department of Computer Science, Rice University, Houston, TX (Sept. 2, 2003); www.cs.rice.edu/~dwallach/courses/comp527_f2003/voteproject.html.

Cited By

View all
  • (2019)An enhanced security mechanism through blockchain for E-polling/counting process using IoT devicesWireless Networks10.1007/s11276-019-02112-5Online publication date: 10-Aug-2019
  • (2017)E-Governance, Deliberative Democracy and Voting ProcessesAdvances in E-Governance10.1201/9781315181530-9(133-157)Online publication date: 17-Feb-2017
  • (2017)Iterative Analysis to Improve Key Properties of Critical Human-Intensive ProcessesACM Transactions on Privacy and Security10.1145/304104120:2(1-31)Online publication date: 15-Mar-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 50, Issue 3
Emergency response information systems: emerging trends and technologies
March 2007
95 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1226736
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2007
Published in CACM Volume 50, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)144
  • Downloads (Last 6 weeks)30
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)An enhanced security mechanism through blockchain for E-polling/counting process using IoT devicesWireless Networks10.1007/s11276-019-02112-5Online publication date: 10-Aug-2019
  • (2017)E-Governance, Deliberative Democracy and Voting ProcessesAdvances in E-Governance10.1201/9781315181530-9(133-157)Online publication date: 17-Feb-2017
  • (2017)Iterative Analysis to Improve Key Properties of Critical Human-Intensive ProcessesACM Transactions on Privacy and Security10.1145/304104120:2(1-31)Online publication date: 15-Mar-2017
  • (2017)Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based ProcessesIEEE Systems Journal10.1109/JSYST.2015.247747211:2(522-533)Online publication date: Jun-2017
  • (2014)Insider Attack Identification and Prevention Using a Declarative ApproachProceedings of the 2014 IEEE Security and Privacy Workshops10.1109/SPW.2014.41(265-276)Online publication date: 17-May-2014
  • (2012)Security and ElectionsIEEE Security and Privacy10.1109/MSP.2012.12710:5(64-67)Online publication date: 1-Sep-2012
  • (2011)L’industrialisation du processus électoralLe Genre humain10.3917/lgh.051.0147N° 51:2(147-169)Online publication date: 15-Sep-2011
  • (2010)Modeling and analyzing faults to improve election process robustnessProceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections10.5555/1924892.1924898(1-8)Online publication date: 9-Aug-2010
  • (2010)An Experience in Testing the Security of Real-World Electronic Voting SystemsIEEE Transactions on Software Engineering10.1109/TSE.2009.5336:4(453-473)Online publication date: 1-Jul-2010
  • (2009)E-voting and forensicsProceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections10.5555/1855491.1855494(3-3)Online publication date: 10-Aug-2009
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media