Browse by author
Lookup NU author(s): Thomas Tjostheim, Thea Peacock, Professor Peter Ryan
There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a “systems-based” view, i.e. considering interactions between the various components of a scheme [13, 24]. Threat analysis has so far been of three main forms: systems-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for analysis of voting systems that essentially combines the first two methods, while avoiding the repetition that can occur with the latter. The model is described in detail, and demonstrated with an example from a case study of the Ryan-Randell “Scratch Card” voting system [20].
Author(s): Tjostheim T, Peacock T, Ryan P Y A
Publication type: Report
Publication status: Published
Series Title: School of Computing Science Technical Report Series
Year: 2007
Pages: 21
Print publication date: 01/01/2007
Source Publication Date: January 2007
Report Number: 1001
Institution: School of Computing Science, University of Newcastle upon Tyne
Place Published: Newcastle upon Tyne
URL: http://www.cs.ncl.ac.uk/publications/trs/papers/1001.pdf