메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Transparency and access to source code in electronic voting

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; ELECTRONIC VOTING; OPEN SOURCE SOFTWARE; PUBLIC RISKS; TRANSPARENCY; VOTING MACHINES;

EID: 84871900561     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (73)
  • 1
    • 85092031989 scopus 로고    scopus 로고
    • A note on terminology: There are three important distinctions to make in this discussion. The difference between open source development and releasing commercially developed code under an open source license is important as these are two modes that we see clearly in voting systems (see discussion of eVACs in §7.1).
    • A note on terminology: There are three important distinctions to make in this discussion. The difference between open source development and releasing commercially developed code under an open source license is important as these are two modes that we see clearly in voting systems (see discussion of eVACs in §7.1).
  • 3
    • 85092036390 scopus 로고    scopus 로고
    • contrast to both open source development and releasing software under an open source license, disclosed source code allows a much more limited use of source code, usually for evaluation purposes only and without permissions to make further copies, modify works or distribute. For example, VoteHere's license agreement
    • In contrast to both open source development and releasing software under an open source license, disclosed source code allows a much more limited use of source code, usually for evaluation purposes only and without permissions to make further copies, modify works or distribute. For example, see VoteHere's license agreement: http://www.votehere.net/VoteHere_ Source_Code_License_2.htm.
  • 7
    • 85092041589 scopus 로고
    • Relevant authorities include the Voting Rights Act of 1965, Public Law 89-10 (VRA), The Americans with Disabilities Act of Public Law 101-336 (ADA), Voting Accessibility for the Elderly and Handicapped Act, Public Law 98-435 and The Help America Vote Act of 2002 Public Law 107 (HAVA)
    • Relevant authorities include the Voting Rights Act of 1965, Public Law 89-10 (VRA), The Americans with Disabilities Act of 1990, Public Law 101-336 (ADA), Voting Accessibility for the Elderly and Handicapped Act, Public Law 98-435 and The Help America Vote Act of 2002 Public Law 107-252 (HAVA).
    • (1990)
  • 9
    • 79959988823 scopus 로고    scopus 로고
    • The Second Enclosure Movement and the Construction of the Public Domain
    • The “enclosure metaphor has also been extended by legal scholars to apply to recent efforts to reduce the amount of material in the public domain. Winter-Spring
    • The “enclosure” metaphor has also been extended by legal scholars to apply to recent efforts to reduce the amount of material in the public domain. Boyle, J. The Second Enclosure Movement and the Construction of the Public Domain, 66 Law and Contemporary Problems 33-74, Winter-Spring 2003, available at: http://ssrn.com/abstract=470983.
    • (2003) Law and Contemporary Problems , vol.66 , pp. 33-74
    • Boyle, J.1
  • 10
    • 84888145853 scopus 로고    scopus 로고
    • For a partial list of bug-finding tools, (last visited June 14, 2006)
    • For a partial list of bug-finding tools, see: List of tools for static code analysis, http://en.wikipedia.org/w/index.php?title=List_of_tools_for_static_code_ analysis&oldid=58643351 (last visited June 14, 2006).
    • List of tools for static code analysis
  • 11
    • 0036086884 scopus 로고    scopus 로고
    • Using programmer-written compiler extensions to catch security holes
    • For an example of what can be done with automated source code analysis (Washington, DC, USA), IEEE Computer Society
    • For an example of what can be done with automated source code analysis, see: Ashcraft, K., And Engler, D. Using programmer-written compiler extensions to catch security holes. In SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2002), IEEE Computer Society, p. 143.
    • (2002) SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 143
    • Ashcraft, K.1    Engler, D.2
  • 12
    • 85092035539 scopus 로고    scopus 로고
    • For an example of work that has used binary analysis techniques to uncover vulnerabilities in executable applications, EADS CCR/STI/C, November
    • For an example of work that has used binary analysis techniques to uncover vulnerabilities in executable applications, see: Desclaux Fabrice, Skype uncovered: Security study of Skype, EADS CCR/STI/C, November 2005, available at: http://www.ossir.org/windows/supports/2005/2005-11-07/EADS-CCR_Fabrice_Skype.pdf
    • (2005) Skype uncovered: Security study of Skype
    • Fabrice, Desclaux1
  • 13
    • 78649563011 scopus 로고    scopus 로고
    • Black Box Testing: Techniques for Functional Testing of Software and Systems
    • For early work in this area
    • For early work in this area, see: Beizer, B. Wiley, J. Black Box Testing: Techniques for Functional Testing of Software and Systems, IEEE Software, 13:5, 98- (1996), available at: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=536464
    • (1996) IEEE Software , vol.13 , Issue.5 , pp. 98
    • Beizer, B.1    Wiley, J.2
  • 15
    • 85092026575 scopus 로고    scopus 로고
    • Penetration testing (sometimes called “Red team or “tiger team attacks) involve a simulated attack on a system where the attack team may know everything (“white box testing) or very little (“black box testing) about a system and attempt to compromise it in the same manner as would a malicious actor. These types of exercises are common in the testing and implementation of high-integrity systems. For more on penetration testing rationales and methodologies, Open Source Security Testing Methodology Manual
    • Penetration testing (sometimes called “Red team” or “tiger team” attacks) involve a simulated attack on a system where the attack team may know everything (“white box” testing) or very little (“black box” testing) about a system and attempt to compromise it in the same manner as would a malicious actor. These types of exercises are common in the testing and implementation of high-integrity systems. For more on penetration testing rationales and methodologies, see: Open Source Security Testing Methodology Manual, available at: http://www.isecom.org/osstmm/.
  • 16
    • 85092056149 scopus 로고    scopus 로고
    • Parallel monitoring, employed during each election now in the State of California, Washington and soon Maryland, involves randomly quarantining a subset of voting machines on election day and voting on them with fake voters and scripted votes to detect bugs, procedural flaws and evidence of possible malicious activity, For more, The University of Iowa, Department of Computer Science
    • Parallel monitoring, employed during each election now in the State of California, Washington and soon Maryland, involves randomly quarantining a subset of voting machines on election day and voting on them with fake voters and scripted votes to detect bugs, procedural flaws and evidence of possible malicious activity. For more, see: Douglas W. Jones, Testing Voting Systems: Parallel testing during an election, The University of Iowa, Department of Computer Science, available at: http://www.cs.uiowa.edu/~jones/voting/testing.shtml.
    • Testing Voting Systems: Parallel testing during an election
    • Jones, Douglas W.1
  • 17
    • 85092050194 scopus 로고    scopus 로고
    • For example response to a question asked by the author at the NIST Voting Systems Threats workshop, EAC commissioners Davisdson and DeGregorio expressed interest in setting up a similar service and process for computerized voting systems
    • For example, Carnegie Mellon University's Computer Emergency Response Team (CERT) is a computer security incident tracking and response service, see: http://www.cert.org/. In response to a question asked by the author at the NIST Voting Systems Threats workshop, EAC commissioners Davisdson and DeGregorio expressed interest in setting up a similar service and process for computerized voting systems.
    • Carnegie Mellon University's Computer Emergency Response Team (CERT) is a computer security incident tracking and response service
  • 20
    • 85092060009 scopus 로고    scopus 로고
    • NASED letter, March 22, available under “certification at
    • NASED letter, “Voting System Memory Card Issues”, March 22, 2006, available under “certification” at: http://www.nased.org/.
    • (2006) Voting System Memory Card Issues
  • 22
    • 85092027379 scopus 로고    scopus 로고
    • November 1, (article notes that ITAs cannot discuss specific systems due to NDAs with vendors)
    • Kim Zetter, E-Voting Tests Get Failing Grade, Wired News, November 1, 2004, (article notes that ITAs cannot discuss specific systems due to NDAs with vendors) available at: http://www.wired.com/news/evote/0,65535-2.html.
    • (2004) E-Voting Tests Get Failing Grade, Wired News
    • Zetter, Kim1
  • 23
    • 85092036214 scopus 로고    scopus 로고
    • ITAA letter to Assemblymember Tom Umberg, March 22, on file with author. Similar sentiments were expressed in written testimony to a California State Senate Committee on Elections hearing in February of 2006
    • ITAA letter to Assemblymember Tom Umberg, “OPPOSE: AB 2097”, March 22, 2006, on file with author. Similar sentiments were expressed in written testimony to a California State Senate Committee on Elections hearing in February of 2006; see: http://tinyurl.com/rsk5e.
    • (2006) OPPOSE: AB 2097
  • 24
    • 19744362318 scopus 로고    scopus 로고
    • Security by obscurity
    • Mercuri, R. T. and Neumann, P. G. Security by obscurity, Communications of the ACM 46:11, 160 (2003) available at: http://doi.acm.org/10.1145/948383.948413;
    • (2003) Communications of the ACM , vol.46 , Issue.11 , pp. 160
    • Mercuri, R. T.1    Neumann, P. G.2
  • 25
    • 85092030453 scopus 로고    scopus 로고
    • One of the best discussions of the notion of “security through obscurity is available on the Wikipedia page for the term. Security through obscurity: (last visited June 14, 2006). Full disclosure: the author is one of the many editors of this Wikipedia page
    • One of the best discussions of the notion of “security through obscurity” is available on the Wikipedia page for the term. See: Security through obscurity: http://en.wikipedia.org/w/index.php?title=Security_through_obscurity&oldid=58172204 (last visited June 14, 2006). Full disclosure: the author is one of the many editors of this Wikipedia page.
  • 29
    • 85092070309 scopus 로고    scopus 로고
    • Inc. CEO, (discussing official's concern and reserving the right to hire an independent expert of their choice to review source code)
    • Linda H. Lamone, Administrator for the Maryland State Board of Elections, letter to Diebold Election Systems, Inc. CEO, available at: http://truevotemd.org/images/stories//ll-diebold.pdf. (discussing official's concern and reserving the right to hire an independent expert of their choice to review source code)
    • Administrator for the Maryland State Board of Elections, letter to Diebold Election Systems
    • Lamone, Linda H.1
  • 30
    • 85092065415 scopus 로고    scopus 로고
    • There have also been movements to obviate the need for increased transparency, such as the move to require voter-verified paper records (VVPRs). At the time of writing, there are currently 26 states that have enacted legislation requiring Direct-Recording Electronic voting machines to produce a Voter Verified Paper Record to provide an independent check on the voting system's recording functions. VerifiedVoting.org's Legislation Tracking page
    • There have also been movements to obviate the need for increased transparency, such as the move to require voter-verified paper records (VVPRs). At the time of writing, there are currently 26 states that have enacted legislation requiring Direct-Recording Electronic voting machines to produce a Voter Verified Paper Record to provide an independent check on the voting system's recording functions. See VerifiedVoting.org's Legislation Tracking page: http://verifiedvoting.org/article.php?list=type&type=13.
  • 31
    • 85092048192 scopus 로고    scopus 로고
    • Other provisions relevant to public scrutiny and expert evaluation include: Vendors must establish a California County User Group and hold one annual meeting where the system's users are invited to review the system and give feedback and reliability testing of 100 individual voting machines under election-day conditions, California Secretary of State
    • Other provisions relevant to public scrutiny and expert evaluation include: Vendors must establish a California County User Group and hold one annual meeting where the system's users are invited to review the system and give feedback and volume reliability testing of 100 individual voting machines under election-day conditions. See: California Secretary of State, “10 Voting System Certification Requirements”, available at: http://ss.ca.gov/elections/ voting_systems/vs_factsheet.pdf.
    • 10 Voting System Certification Requirements
  • 32
    • 85092057795 scopus 로고    scopus 로고
    • [T]he Legislature hereby requests the Secretary of State to investigate and evaluate the use of open-source software in all voting machines in California and report his or her findings and recommendations to the Legislature
    • ACR 242, as chaptered, available here
    • “[T]he Legislature hereby requests the Secretary of State to investigate and evaluate the use of open-source software in all voting machines in California and report his or her findings and recommendations to the Legislature.” See ACR 242, as chaptered, available here: http://www.leginfo.ca.gov/pub/03-04/bill/asm/ab_ 0201-0250/acr_242_bill_20040831_chaptered.html
  • 33
    • 85092045154 scopus 로고    scopus 로고
    • Office of the California Secretary of State, 31 January
    • Office of the California Secretary of State, “Open Source Software in Voting Systems”, 31 January 2006, available at: http://ss.ca.gov/elections/open_source_report.pdf.
    • (2006) Open Source Software in Voting Systems
  • 35
    • 85092067832 scopus 로고    scopus 로고
    • 163-165.7(c), available as passed by both houses of the NC Legislature here
    • See §163-165.7(c), available as passed by both houses of the NC Legislature here: http://www.ncga.state.nc.us/Sessions/2005/Bills/Senate/HTML/S223v7.html.
  • 36
    • 85092064527 scopus 로고    scopus 로고
    • Diebold Election Systems, Inc. was concerned that, among other things, it didn't have the rights to provide access to the source code of third-party software components of its system. It sued the North Carolina Board of Elections to prevent this regulation from taking effect. The case was dismissed as the Court found that there wa dispute as to the language or interpretation of the statute, unpublished (NC. Super. November 30)
    • Diebold Election Systems, Inc. was concerned that, among other things, it didn't have the rights to provide access to the source code of third-party software components of its system. It sued the North Carolina Board of Elections to prevent this regulation from taking effect. The case was dismissed as the Court found that there was no dispute as to the language or interpretation of the statute. See: Diebold v. North Carolina Board of Elections, unpublished (NC. Super. November 30, 2005), available at: http://www.eff.org/Activism/E-voting/diebold_order_dismissal.pdf.
    • (2005) Diebold v. North Carolina Board of Elections
  • 38
    • 85092036412 scopus 로고    scopus 로고
    • Wisconsin Act 92, The author knows of at least eight states with escrow requirements in regulation or statute (CA, CO, IL, MN, NC, UT, WI and WA)
    • Wisconsin Act 92, available at: http://www.legis.state.wi.us/2005/data/acts/05Act92.pdf. The author knows of at least eight states with escrow requirements in regulation or statute (CA, CO, IL, MN, NC, UT, WI and WA).
  • 40
    • 85092023383 scopus 로고    scopus 로고
    • There has bee federal electoral legislation since the passage of HAVA in At the time of writing, there are at least six bills excluding companion bills in the U.S. Congress that would substantially reform the conduct of elections on top of the reforms of HAVA. These six bills are: H.R. 550 (text is)
    • There has been no federal electoral legislation since the passage of HAVA in 2002. At the time of writing, there are at least six bills - excluding companion bills - in the U.S. Congress that would substantially reform the conduct of elections on top of the reforms of HAVA. These six bills are: H.R. 550 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00550:)
    • (2002)
  • 41
    • 85092071933 scopus 로고    scopus 로고
    • H.R. 704/S. 330 (text is and http://thomas.loc.gov/cgi-bin/query/z?c109:S.330: respectively)
    • H.R. 704/S. 330 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.704: and http://thomas.loc.gov/cgi-bin/query/z?c109:S.330: respectively)
  • 42
    • 85092026089 scopus 로고    scopus 로고
    • H.R. 939/S. 450 (text is and http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00450: respectively
    • H.R. 939/S. 450 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00939: and http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00450: respectively;
  • 43
    • 85092068255 scopus 로고    scopus 로고
    • note the two versions of these bills contain significant differences), H.R. 533/S. 17 (text is and http://thomas.loc.gov/cgi-bin/query/z?c109:S.17: respectively; note the two versions of these bills contain significant differences)
    • note the two versions of these bills contain significant differences), H.R. 533/S. 17 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00533: and http://thomas.loc.gov/cgi-bin/query/z?c109:S.17: respectively; note the two versions of these bills contain significant differences)
  • 44
    • 85092032002 scopus 로고    scopus 로고
    • H.R. 278 (text is)
    • H.R. 278 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.278:)
  • 45
    • 85092060242 scopus 로고    scopus 로고
    • and H.R. 3910 (text is)
    • and H.R. 3910 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.3910:).
  • 47
    • 85092022064 scopus 로고    scopus 로고
    • Speech by Congressman Bob Ney, given at Cleveland State University, Center for Election Integrity on November 30, This sentiment appears to be the main cause behind why none of the six bills in Congress have gained much traction. While wise in some respects, this mindset neglects the fact that the time cycles involved in development of computerized voting equipment are much quicker than the timeframes included as deadlines in the statutes
    • Congressman Bob Ney, former chair of the Committee on House Administration - which has federal election law jurisdiction - has expressed the sentiment that possible election reform should wait for past legislative action to run its course. See: Speech by Congressman Bob Ney, given at Cleveland State University, Center for Election Integrity on November 30, 2005, available at: http://cha.house.gov/MediaPages/PRArticle.aspx?NewsID=1146. This sentiment appears to be the main cause behind why none of the six bills in Congress have gained much traction. While wise in some respects, this mindset neglects the fact that the time cycles involved in development of computerized voting equipment are much quicker than the timeframes included as deadlines in the statutes.
    • (2005) Congressman Bob Ney, former chair of the Committee on House Administration - which has federal election law jurisdiction - has expressed the sentiment that possible election reform should wait for past legislative action to run its course
  • 48
    • 85092040456 scopus 로고    scopus 로고
    • No voting system shall at any time contain or use any undisclosed software
    • The relevant language in both bills is: H.R. 550 §247(c)(1) and H.R. 939/S. 450 §101(c). The one-word difference is that H.R. 550 would allow the disclosure to any “person while H.R. 939/S. 450 only allows disclosure to “citizens
    • The relevant language in both bills is: “No voting system shall at any time contain or use any undisclosed software.” See: H.R. 550 §247(c)(1) and H.R. 939/S. 450 §101(c). The one-word difference is that H.R. 550 would allow the disclosure to any “person” while H.R. 939/S. 450 only allows disclosure to “citizens”.
  • 49
    • 85092044819 scopus 로고    scopus 로고
    • 533 §329(a) and §299G
    • H.R. 533 §329(a) and §299G.
    • H.R
  • 50
    • 85092057671 scopus 로고    scopus 로고
    • For an appreciation of the variety in open source licensing regimes, browse the Open Source Initiative's (OSI) “Approved License list and the Free Software Foundation's web page “Various Licenses and Comments about Them http://www.gnu.org/philosophy/license-list.html
    • For an appreciation of the variety in open source licensing regimes, browse the Open Source Initiative's (OSI) “Approved License” list http://www.opensource.org/licenses and the Free Software Foundation's web page “Various Licenses and Comments about Them” http://www.gnu.org/philosophy/license-list.html.
  • 51
    • 85092050088 scopus 로고    scopus 로고
    • Open source licensing covers many licenses, some of which are incompatible with each other. GNU General Public License: http://www.gnu.org/copyleft/gpl.html
    • Open source licensing covers many licenses, some of which are incompatible with each other. Licenses span a spectrum of very simple - like the modified BSD license: http://www.opensource.org/licenses/bsd-license.php - to the very intricate and complex - like the GNU General Public License: http://www.gnu.org/copyleft/gpl.html.
    • Licenses span a spectrum of very simple - like the modified BSD license
  • 56
    • 85092049580 scopus 로고
    • Fuzz testing” - where software products are bombarded with random input to test reliability - has found that source-available software utilizing open source development techniques is considerably more reliable than closed, proprietary products
    • Lipner, note 30; Technical report, Computer Sciences Department, University of Wisconsin
    • See Lipner, note 30; “Fuzz testing” - where software products are bombarded with random input to test reliability - has found that source-available software utilizing open source development techniques is considerably more reliable than closed, proprietary products. See: B. Miller, D. Koski, C. Lee, V. Maganty, R. Murthy, A. Natarajan and J. Steidl. Fuzz revisited: A re-examination of the reliability of unix utilities and services. Technical report, Computer Sciences Department, University of Wisconsin (1995), available at http://citeseer.ist.psu.edu/miller95fuzz.html
    • (1995) Fuzz revisited: A re-examination of the reliability of unix utilities and services
    • Miller, B.1    Koski, D.2    Lee, C.3    Maganty, V.4    Murthy, R.5    Natarajan, A.6    Steidl, J.7
  • 57
    • 85092064189 scopus 로고    scopus 로고
    • Here are a few examples the Fall of 2004, Diebold sent cease and-desist letters to of students who had published an internal email archive that exposed the fact that Diebold had been using uncertified software on their machines. OPG, Pavlosky & Smith Diebold, 72 U.S.P.Q.2d 1200 (N.D. Cal. Sept. 30) Diebold has also sent letters and a “product use advisory to Florida election officials warning them of intellectual property limitations on the testing of their voting systems in conjunction with other vendors systems. Id., note 23, at 21 North Carolina, in response to the new legislation discussed in §4.3.2, Diebold sued the State Board of Elections arguing that it could not provide source code to third-party software for the evaluation demanded by the new statute note 40)
    • Here are a few examples: In the Fall of 2004, Diebold sent cease- and-desist letters to a number of students who had published an internal email archive that exposed the fact that Diebold had been using uncertified software on their machines. OPG, Pavlosky & Smith v. Diebold, 72 U.S.P.Q.2d 1200 (N.D. Cal. Sept. 30, 2004) available at: http://www.eff.org/legal/ISP_liability/OPG_ v_Diebold/20040930_Diebold_SJ_Order.pdf. Diebold has also sent letters and a “product use advisory” to Florida election officials warning them of intellectual property limitations on the testing of their voting systems in conjunction with other vendors systems. See Id., note 23, at 21. In North Carolina, in response to the new legislation discussed in §4.3.2, Diebold sued the State Board of Elections arguing that it could not provide source code to third-party software for the evaluation demanded by the new statute (see note 40).
    • (2004)
  • 58
    • 33646075395 scopus 로고    scopus 로고
    • A model for when disclosure helps security: What is different about computer and network security?
    • Swire develops a model of when disclosing security vulnerabilities will help or hinder system defenders
    • Swire develops a model of when disclosing security vulnerabilities will help or hinder system defenders: Swire, P. P. A model for when disclosure helps security: What is different about computer and network security? 2 Journal on Telecommunications and High Technology Law 163 (2004).
    • (2004) 2 Journal on Telecommunications and High Technology Law , pp. 163
    • Swire, P. P.1
  • 59
    • 85092027085 scopus 로고    scopus 로고
    • There are unanswered questions about whether or not Presidential elections can be postponed without amending the Constitution. Congressional Research Service, October 4
    • There are unanswered questions about whether or not Presidential elections can be postponed without amending the Constitution. See: Congressional Research Service, “Postponement and Rescheduling of Elections to Federal Office”, October 4, 2004: http://www.fas.org/sgp/crs/RL32623.pdf.
    • (2004) Postponement and Rescheduling of Elections to Federal Office
  • 61
    • 85092073039 scopus 로고    scopus 로고
    • The first quasi-open source software product to be used in U.S. elections was ChoicePlus by Voting Solutions. This software has been used to administer local-level ranked-ballot elections in Cambridge, MA since 1998 and Burlington, VT. It was planned to be released under the GNU GPL in November of 2003 but one small, proprietary piece of code has prohibited the full release of the software under the GNU GPL. Interview with Steve Willet of Voting Solutions, April 7, 2006, on file with author; Successful public election joins Diebold, free software, NewsForge, April 4, 2006
    • The first quasi-open source software product to be used in U.S. elections was ChoicePlus by Voting Solutions. This software has been used to administer local-level ranked-ballot elections in Cambridge, MA since 1998 and Burlington, VT. It was planned to be released under the GNU GPL in November of 2003 but one small, proprietary piece of code has prohibited the full release of the software under the GNU GPL. Interview with Steve Willet of Voting Solutions, April 7, 2006, on file with author; Jay Lyman, Successful public election joins Diebold, free software, NewsForge, April 4, 2006, available at: http://trends.newsforge.com/article.pl?sid=06/03/23/2040258&tid=136&tid=132.
    • Lyman, Jay1
  • 62
    • 85092072522 scopus 로고    scopus 로고
    • The following nations have either posted or claim to have posted voting system software in publicly-accessible forums or to select organizations: Argentina, Venezuela, Estonia and Kazakhstan. available (in Spanish) here
    • The following nations have either posted or claim to have posted voting system software in publicly-accessible forums or to select organizations: Argentina, Venezuela, Estonia and Kazakhstan. See: “Publicación de Software y Documentación”, available (in Spanish) here: http://www.buenosaires.gov.ar/dgelec/index.php?module=pruebaPiloto&file=publicacion
    • Publicación de Software y Documentación
  • 64
    • 85092070696 scopus 로고    scopus 로고
    • (in Estonian): at: http://www.vvk.ee/elektr/dokumendid.htm, Kazakhstan claims to allow review of the source code used to power their voting systems
    • See (in Estonian): http://www.vvk.ee/elektr/docs/Yldkirjeldus-eng.pdf and documentation/software at: http://www.vvk.ee/elektr/dokumendid.htm, Kazakhstan claims to allow review of the source code used to power their voting systems;
  • 65
    • 85092058182 scopus 로고    scopus 로고
    • it is hard to find. The Kazakh elections website (in Cyrillic)
    • it is hard to find. The Kazakh elections website (in Cyrillic): http://election.kz/.
  • 67
    • 85092031229 scopus 로고    scopus 로고
    • Legal issues relating to free and open source software
    • For example, under §68(1) of Australia's Trade Practices Act of 1974, a disclaimer of warranty is void if it does not follow the particular conventions and wording of the Act
    • For example, under §68(1) of Australia's Trade Practices Act of 1974, a disclaimer of warranty is void if it does not follow the particular conventions and wording of the Act. See: Fitzgerald, B., And Bassett, G. Legal issues relating to free and open source software. Essays in Technology Policy and Law (Queensland University of Technology School of Law) 1 (2003).
    • (2003) Essays in Technology Policy and Law (Queensland University of Technology School of Law) , pp. 1
    • Fitzgerald, B.1    Bassett, G.2
  • 68
    • 85092058571 scopus 로고    scopus 로고
    • However, as this article goes to press, there are indications that Apple has closed pieces of its software in a strategy to prevent people from running their software on non-Apple hardware. May 17
    • However, as this article goes to press, there are indications that Apple has closed pieces of its software in a strategy to prevent people from running their software on non-Apple hardware. See: Tom Yager, Apple closes down OS X, InfoWorld, May 17, 2006, available at: http://www.infoworld.com/article/06/05/17/78300_21OPcurve_1.html.
    • (2006) Apple closes down OS X, InfoWorld
    • Yager, Tom1
  • 69
    • 11844260026 scopus 로고    scopus 로고
    • Independent testing of voting systems
    • Coggins, C. Independent testing of voting systems. Communications of the ACM 47:10, 34-38 (2004).
    • (2004) Communications of the ACM , vol.47 , Issue.10 , pp. 34-38
    • Coggins, C.1
  • 71
    • 33751038992 scopus 로고    scopus 로고
    • Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or - how to store ballots on a voting machine (extended abstract)
    • Molnar, D., Kohno, T., Sastry, N., And Wagner, D. Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or - how to store ballots on a voting machine (extended abstract). In IEEE Symposium on Security and Privacy (2006).
    • (2006) IEEE Symposium on Security and Privacy
    • Molnar, D.1    Kohno, T.2    Sastry, N.3    Wagner, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.