Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Necessary Requirements to Developed an E-Election System Protocol based on Legal, Social and Security Point of View

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 9
Year of Publication: 2012
Authors:
Vinod. M. Patil

Vinod. M Patil. Article: Necessary Requirements to Developed an E-Election System Protocol based on Legal, Social and Security Point of View. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(9):17-21, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Vinod. M. Patil},
	title = {Article: Necessary Requirements to Developed an E-Election System Protocol based on Legal, Social and Security Point of View},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {9},
	pages = {17-21},
	month = {May},
	note = {Full text available}
}

Abstract

Computers and computer networks technology play a major role in the field of research and developments stages of information and communications technology (ICT) in the globe. This can motivate and encourage to introducing an electronic election system or proposing an E-election protocol to implementing an e-election system. Any e-election protocol or application may be accepted on basis of reliable, secure and efficient and satisfies core requirement and some basic properties. These requirements are mandatory for any electronic voting systems. A Secure system should need these requirements for execution and acceptance by voters and political parties otherwise, it will not be an adequate solution to electoral system.

References

  • Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks", ieee journal on selected areas in communications, vol. 24, no. 2, February 2006, pp 370-380.
  • Langer, L. ; Schmidt, A. ; Buchmann, J. ; Volkamer, M. ; Stolfik, A. ; "Towards a Framework on the Security Requirements for Electronic Voting Protocols" , First IEEE International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009 , Page(s): 61 – 68.
  • Yasinsac, A. ; Bishop, M. ; "Of Paper Trails and Voter Receipts" ,Hawaii International Conference on System Sciences, Proceedings of the 41st Annual 7-10 Jan. 2008 Page(s):487 – 487.
  • Prosser, A. ; Krimmer, R. ; Kofler, R. ; Unger, M. K. ; "The Role of the Election Commission in Electronic Voting", System Sciences, 2005. HICSS '05,Proceedings of the 38th Annual Hawaii International Conference on 03-06 Jan. 2005 Page(s):1-6.
  • Athanassios Kosmopoulos ,"Aspects of regulatory and legal implementations on e-Voting ",s. wang et al. (Eds):ER workshop 2004. LNCS 3289, pp. 589-600, 2004.
  • J W Bryans, B Littlewood, P Y A Ryan, L Strigini, " E-voting: Dependability Requirements and Design for Dependability", Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on 20-22 April 2006 Page(s):8 pp.
  • Anane, R. ; Freeland, R. ; Theodoropoulos, G. ;" e-Voting Requirements and Implementation", E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2007, Page(s): 382 – 392.
  • Charles A. Gaston, "A Better Way to Vote", Proceedings of the 38th Hawaii International Conference on System Sciences – 2005, 0-7695-2268-8/05, IEEE,pp 1-6.
  • Alexandros Xenakis and Prof. Ann Macintosh, "Procedural Security in Electronic Voting", Proceedings of the 37th Hawaii International Conference on System Sciences – 2004, 0-7695-2056-1/04, 5-8 January, 2004 IEEE pp 1-8.
  • Costas lambrinoudakis, dimitris gritzalis, sokratis katsikas, "Building a Reliable e-Voting System: Functional Requirements and Legal Constraints", Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA'02) ,1529-4188/02, 2002 IEEE,pp 435.
  • Cansell, D. ; Gibson, J. P. ; Mery, D. ; "Formal verification of tamper-evident storage for e-voting", Software Engineering and Formal Methods, 2007. SEFM 2007. Fifth IEEE International Conference on 10-14 Sept. 2007 Page(s):329 – 338.
  • Villafiorita, A. ; Weldemariam, K. ; Tiella, R. ; "Development, Formal Verification, and Evaluation of an E-Voting System With VVPAT"; Information Forensics and Security, IEEE Transactions on Volume: 4 , Issue: 4 , Part: 1, 2009 Page(s): 651 – 661.
  • Thomas E. Carroll , Daniel Grosu "A Secure and Efficient Voter-Controlled Anonymous Election Scheme", Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on Volume 1, 4-6 April 2005 Page(s):721 - 726 Vol. 1.
  • Robert Kofler, Robert Krimmer, Alexander Prosser, "Electronic Voting: Algorithmic and Implementation Issues", Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) , 2003. 6-9 Jan 2003 Page(s):7 pp.
  • Melanie Volkamer, Margaret McGaley , "Requirements and Evaluation Procedures for e Voting", Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on 10-13 April 2007 Page(s):895 – 902.
  • Weldemariam, K. ; Mattioli, A. ; Villafiorita, A. ; "Managing Requirements for E-Voting Systems: Issues and Approaches", First IEEE International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009 Page(s): 29 – 37.
  • Brian whitworth and robert j. Mcqueen, "Voting before discussing: Computer voting as social communication", Proceedings of the 32nd Hawaii International Conference on System Sciences – 1999 IEEE ,pp 1-12.