2 research outputs found

    Oportunitats estrat猫giques per a la implementaci贸 del vot electr貌nic remot

    Get PDF
    A partir d'una an脿lisi comparada de diferents experi猫ncies d'implementaci贸 del vot electr貌nic remot a Espanya i de dades sociopol铆tiques de valoraci贸 d'aquestes votacions, es discuteixen els diferents arguments justificadors de la seva implementaci贸. S'analitzen aix铆 els arguments estructurals que incentiven l'adopci贸 del vot electr貌nic en el context del funcionament dels sistemes pol铆tics democr脿tics, sense oblidar, per貌, la percepci贸 i l'avaluaci贸 dels ciutadans davant l'煤s de les NTIC per a l'emissi贸 del vot. L'an脿lisi se centra en la presa en consideraci贸 de les debilitats i les amenaces potencials associades a la introducci贸 del vot electr貌nic, per a concloure que la seva implementaci贸 haur脿 d'茅sser progressiva i complement脿ria als sistemes tradicionals de votaci贸.</p

    Using Formal Methods for Building more Reliable and Secure e-voting Systems

    Get PDF
    Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural levels of assurance also with respect to social and regu- latory frameworks. This is because threats and attacks may not only derive from pitfalls in complex security critical system, but also from ill-designed procedures. However, existing methodologies are not mature enough to em- brace procedural implications and the need for multidisciplinary approach on the safe and secure operation of system. This is particularly common in electronic voting (e-voting) systems. This dissertation focuses along two lines. First, we propose an approach to guarantee a reasonable security to the overall systems by performing for- mal procedural security analysis. We apply existing techniques and define novel methodologies and approaches for the analysis and verification of procedural rich systems. This includes not only the definition of adequate modeling convention, but also the definition of general techniques for the injection of attacks, and for the transformation of process models into rep- resentations that can be given as input to model checkers. With this it is possible to understand and highlight how the switch to the new tech- nological solution changes security, with the ultimate goal of defining the procedures regulating system and system processes that ensure a sufficient level of security for the system as well as for its procedures. We then investigate the usage of formal methods to study and analyze the strength and weaknesses of currently deployed (e-voting) system in order to build the next generation (e-voting) systems. More specifically, we show how formal verification techniques can be used to model and reason about the security of an existing e-voting system. To do that, we reuse the methodology propose for procedural security analysis. The practical applicability of the approaches is demonstrated in several case studies from the domain of public administrations in general and in e-voting system in particular. With this it can be possible to build more secure, reliable, and trustworthy e-voting system
    corecore