Seven Principles for Secure E-Voting #103

The information is taken from: ACM Communications, Vol 52, No-2. Author F. Gerlach, Badden Wurttemberg, Germany

  1. Proven Security: All protocols and techniques must be mathematically proved to be secure
  2. Trustworthy Design Responsibility: The E-voting responsibility should be assigned to a highly reliable and trustworthy organization
  3. Published Source Code: Application source code should be made public
  4. Vote Verification: All voters should be able to verify their votes afterward
  5. Voter Accessibility: A full list of voters must be available to all citizens
  6. Ensure Anonymization: Techniques like onion routing should be used for anonymization
  7. Expert Oversight: The election system must be handled by experts. For example, experts must be employed to handle DDOS attacks.

From: http://sitestree.com/?p=5176
Categories:103
Tags:
Post Data:2009-02-20 10:30:48

    Shop Online: <a href='https://www.ShopForSoul.com/' target='new' rel="noopener">https://www.ShopForSoul.com/</a>
    (Big Data, Cloud, Security, Machine Learning): Courses: <a href='http://Training.SitesTree.com' target='new' rel="noopener"> http://Training.SitesTree.com</a> 
    In Bengali: <a href='http://Bangla.SaLearningSchool.com' target='new' rel="noopener">http://Bangla.SaLearningSchool.com</a>
    <a href='http://SitesTree.com' target='new' rel="noopener">http://SitesTree.com</a>
    8112223 Canada Inc./JustEtc: <a href='http://JustEtc.net' target='new' rel="noopener">http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning) </a>
    Shop Online: <a href='https://www.ShopForSoul.com'> https://www.ShopForSoul.com/</a>
    Medium: <a href='https://medium.com/@SayedAhmedCanada' target='new' rel="noopener"> https://medium.com/@SayedAhmedCanada </a>

Leave a Reply