Show simple item record

dc.contributor.authorSelker, Ted
dc.date.accessioned2015-04-14T17:26:08Z
dc.date.available2015-04-14T17:26:08Z
dc.date.issued2004-04-20
dc.identifier.urihttp://hdl.handle.net/1721.1/96552
dc.description.abstractComputers are important in every aspect of modern life. Automative tabulating machines are designed to be the most consistent and reliable counting approach invented. Still, questions of reliability, security and auditability persist. Ken Thompson and others have shown that, like other carelessly composed processes, computer programs can harbor potentially criminal activity. To be useful for voting, software must simplify and improve the ability to record and report intentions. Best practices must be used in creating important software to guard against bugs and malware. In spite of the fact that malware can be hidden in any program, there are ways to assure that it is not impacting the operation of the software. First, test vectors must allow testing of the software in every conceivable situation. Second, demonstrations can be arranged to show that it is running correctly when it is actually used. Third, computers can produce multiple records to assure that it has performed correctly.en_US
dc.language.isoen_USen_US
dc.publisherCaltech/MIT Voting Technology Projecten_US
dc.relation.ispartofseriesVTP Working Paper Series;15
dc.subjectVoting softwareen_US
dc.subjectElectronic registration softwareen_US
dc.subjectElectronic voting machinesen_US
dc.subjectBackend tally counting systemsen_US
dc.subjectSoftware certificationen_US
dc.titleCertification and Voting Software: Position Statementen_US
dc.typeWorking Paperen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record