Threat Analyses for Voting System CategoriesA Workshop on Rating Voting MethodsVSRW 068-9 June 2006The George Washington UniversityPartially Funded by NSF |
|||||
Home
Submit a paper |
REGISTRATION
NOW OPEN Registration
Numerous election procedures and supporting technologies have been used over the centuries, yet no formal methodology for examining these exists. This absence is particularly conspicuous today, and the discovery of several security vulnerabilities in commercially available voting systems has led to confusion about the merits of voting systems. A rigorous objective rating framework for comparing and evaluating systems, based on their performance with respect to desirable properties, would expose a rich field of theoretical and practical challenges, and go a long way towards restoring faith in voting technology. This workshop will take the first steps towards an objective rating framework, focusing on: A. Four types of voting systems: (a) those with Voter
Verifiable Paper Audit Trails (VVPAT), (b) those using optical scan,
(c) those using Modular Voting Architectures (or "frogs"), where vote
generation is separate from vote casting, and (d) those based on
cryptography To this end, the workshop calls for
submissions of straw models of the four types of voting systems,
and of objective rating criteria for the three desirable properties
mentioned. While usability is an important desirable property, it is
largely considered out of the scope of this workshop. The workshop, co-sponsored by NIST and NSF, and located at George Washington University, will be a follow-up of the highly successful one on Threats to Voting Systems, organized by NIST in October 2005. It will consist of four sessions of papers chosen from the submissions, interspersed with invited talks. For more details, see Workshop Format.
|