A model for system-based analysis of voting systems

  • Authors:
  • Thomas Tjøstheim;Thea Peacock;Peter Y. A. Ryan

  • Affiliations:
  • School of Computing Science, University of Newcastle, Newcastle upon Tyne, United Kingdom;School of Computing Science, University of Newcastle, Newcastle upon Tyne, United Kingdom;School of Computing Science, University of Newcastle, Newcastle upon Tyne, United Kingdom

  • Venue:
  • Proceedings of the 15th international conference on Security protocols
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a "system-based" view, i.e. considering interactions between the various components of a scheme [1,2]. Threat analysis has so far been of three main forms: system-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for system-based analysis of voting systems that is more systematic than previous work. Themodel is described in detail, and demonstratedwith an example from a case study of the Randell-Ryan "Scratch Card" voting system [3].