-
1
-
-
85092031989
-
-
A note on terminology: There are three important distinctions to make in this discussion. The difference between open source development and releasing commercially developed code under an open source license is important as these are two modes that we see clearly in voting systems (see discussion of eVACs in §7.1).
-
A note on terminology: There are three important distinctions to make in this discussion. The difference between open source development and releasing commercially developed code under an open source license is important as these are two modes that we see clearly in voting systems (see discussion of eVACs in §7.1).
-
-
-
-
3
-
-
85092036390
-
-
contrast to both open source development and releasing software under an open source license, disclosed source code allows a much more limited use of source code, usually for evaluation purposes only and without permissions to make further copies, modify works or distribute. For example, VoteHere's license agreement
-
In contrast to both open source development and releasing software under an open source license, disclosed source code allows a much more limited use of source code, usually for evaluation purposes only and without permissions to make further copies, modify works or distribute. For example, see VoteHere's license agreement: http://www.votehere.net/VoteHere_ Source_Code_License_2.htm.
-
-
-
-
4
-
-
70350439406
-
Privacy issues in an electronic voting machine
-
Katherine J. Strandburg and Daniela Stan Raicu, Eds. Springer Science+Business Media:New York
-
Keller, A. M., Mertz, D., Hall, J. L., And Urken, A. Privacy issues in an electronic voting machine. In Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Katherine J. Strandburg and Daniela Stan Raicu, Eds. Springer Science+Business Media:New York, 2006.
-
(2006)
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation
-
-
Keller, A. M.1
Mertz, D.2
Hall, J. L.3
Urken, A.4
-
7
-
-
85092041589
-
-
Relevant authorities include the Voting Rights Act of 1965, Public Law 89-10 (VRA), The Americans with Disabilities Act of Public Law 101-336 (ADA), Voting Accessibility for the Elderly and Handicapped Act, Public Law 98-435 and The Help America Vote Act of 2002 Public Law 107 (HAVA)
-
Relevant authorities include the Voting Rights Act of 1965, Public Law 89-10 (VRA), The Americans with Disabilities Act of 1990, Public Law 101-336 (ADA), Voting Accessibility for the Elderly and Handicapped Act, Public Law 98-435 and The Help America Vote Act of 2002 Public Law 107-252 (HAVA).
-
(1990)
-
-
-
8
-
-
3543102147
-
Analysis of an electronic voting system
-
Kohno, T., Stubblefield, A., Rubin, A. D., And Wallach, D. S. Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy (2004), pp. 27.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 27
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A. D.3
Wallach, D. S.4
-
9
-
-
79959988823
-
The Second Enclosure Movement and the Construction of the Public Domain
-
The “enclosure metaphor has also been extended by legal scholars to apply to recent efforts to reduce the amount of material in the public domain. Winter-Spring
-
The “enclosure” metaphor has also been extended by legal scholars to apply to recent efforts to reduce the amount of material in the public domain. Boyle, J. The Second Enclosure Movement and the Construction of the Public Domain, 66 Law and Contemporary Problems 33-74, Winter-Spring 2003, available at: http://ssrn.com/abstract=470983.
-
(2003)
Law and Contemporary Problems
, vol.66
, pp. 33-74
-
-
Boyle, J.1
-
10
-
-
84888145853
-
-
For a partial list of bug-finding tools, (last visited June 14, 2006)
-
For a partial list of bug-finding tools, see: List of tools for static code analysis, http://en.wikipedia.org/w/index.php?title=List_of_tools_for_static_code_ analysis&oldid=58643351 (last visited June 14, 2006).
-
List of tools for static code analysis
-
-
-
11
-
-
0036086884
-
Using programmer-written compiler extensions to catch security holes
-
For an example of what can be done with automated source code analysis (Washington, DC, USA), IEEE Computer Society
-
For an example of what can be done with automated source code analysis, see: Ashcraft, K., And Engler, D. Using programmer-written compiler extensions to catch security holes. In SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2002), IEEE Computer Society, p. 143.
-
(2002)
SP'02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 143
-
-
Ashcraft, K.1
Engler, D.2
-
12
-
-
85092035539
-
-
For an example of work that has used binary analysis techniques to uncover vulnerabilities in executable applications, EADS CCR/STI/C, November
-
For an example of work that has used binary analysis techniques to uncover vulnerabilities in executable applications, see: Desclaux Fabrice, Skype uncovered: Security study of Skype, EADS CCR/STI/C, November 2005, available at: http://www.ossir.org/windows/supports/2005/2005-11-07/EADS-CCR_Fabrice_Skype.pdf
-
(2005)
Skype uncovered: Security study of Skype
-
-
Fabrice, Desclaux1
-
13
-
-
78649563011
-
Black Box Testing: Techniques for Functional Testing of Software and Systems
-
For early work in this area
-
For early work in this area, see: Beizer, B. Wiley, J. Black Box Testing: Techniques for Functional Testing of Software and Systems, IEEE Software, 13:5, 98- (1996), available at: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=536464
-
(1996)
IEEE Software
, vol.13
, Issue.5
, pp. 98
-
-
Beizer, B.1
Wiley, J.2
-
15
-
-
85092026575
-
-
Penetration testing (sometimes called “Red team or “tiger team attacks) involve a simulated attack on a system where the attack team may know everything (“white box testing) or very little (“black box testing) about a system and attempt to compromise it in the same manner as would a malicious actor. These types of exercises are common in the testing and implementation of high-integrity systems. For more on penetration testing rationales and methodologies, Open Source Security Testing Methodology Manual
-
Penetration testing (sometimes called “Red team” or “tiger team” attacks) involve a simulated attack on a system where the attack team may know everything (“white box” testing) or very little (“black box” testing) about a system and attempt to compromise it in the same manner as would a malicious actor. These types of exercises are common in the testing and implementation of high-integrity systems. For more on penetration testing rationales and methodologies, see: Open Source Security Testing Methodology Manual, available at: http://www.isecom.org/osstmm/.
-
-
-
-
16
-
-
85092056149
-
-
Parallel monitoring, employed during each election now in the State of California, Washington and soon Maryland, involves randomly quarantining a subset of voting machines on election day and voting on them with fake voters and scripted votes to detect bugs, procedural flaws and evidence of possible malicious activity, For more, The University of Iowa, Department of Computer Science
-
Parallel monitoring, employed during each election now in the State of California, Washington and soon Maryland, involves randomly quarantining a subset of voting machines on election day and voting on them with fake voters and scripted votes to detect bugs, procedural flaws and evidence of possible malicious activity. For more, see: Douglas W. Jones, Testing Voting Systems: Parallel testing during an election, The University of Iowa, Department of Computer Science, available at: http://www.cs.uiowa.edu/~jones/voting/testing.shtml.
-
Testing Voting Systems: Parallel testing during an election
-
-
Jones, Douglas W.1
-
17
-
-
85092050194
-
-
For example response to a question asked by the author at the NIST Voting Systems Threats workshop, EAC commissioners Davisdson and DeGregorio expressed interest in setting up a similar service and process for computerized voting systems
-
For example, Carnegie Mellon University's Computer Emergency Response Team (CERT) is a computer security incident tracking and response service, see: http://www.cert.org/. In response to a question asked by the author at the NIST Voting Systems Threats workshop, EAC commissioners Davisdson and DeGregorio expressed interest in setting up a similar service and process for computerized voting systems.
-
Carnegie Mellon University's Computer Emergency Response Team (CERT) is a computer security incident tracking and response service
-
-
-
20
-
-
85092060009
-
-
NASED letter, March 22, available under “certification at
-
NASED letter, “Voting System Memory Card Issues”, March 22, 2006, available under “certification” at: http://www.nased.org/.
-
(2006)
Voting System Memory Card Issues
-
-
-
22
-
-
85092027379
-
-
November 1, (article notes that ITAs cannot discuss specific systems due to NDAs with vendors)
-
Kim Zetter, E-Voting Tests Get Failing Grade, Wired News, November 1, 2004, (article notes that ITAs cannot discuss specific systems due to NDAs with vendors) available at: http://www.wired.com/news/evote/0,65535-2.html.
-
(2004)
E-Voting Tests Get Failing Grade, Wired News
-
-
Zetter, Kim1
-
23
-
-
85092036214
-
-
ITAA letter to Assemblymember Tom Umberg, March 22, on file with author. Similar sentiments were expressed in written testimony to a California State Senate Committee on Elections hearing in February of 2006
-
ITAA letter to Assemblymember Tom Umberg, “OPPOSE: AB 2097”, March 22, 2006, on file with author. Similar sentiments were expressed in written testimony to a California State Senate Committee on Elections hearing in February of 2006; see: http://tinyurl.com/rsk5e.
-
(2006)
OPPOSE: AB 2097
-
-
-
24
-
-
19744362318
-
Security by obscurity
-
Mercuri, R. T. and Neumann, P. G. Security by obscurity, Communications of the ACM 46:11, 160 (2003) available at: http://doi.acm.org/10.1145/948383.948413;
-
(2003)
Communications of the ACM
, vol.46
, Issue.11
, pp. 160
-
-
Mercuri, R. T.1
Neumann, P. G.2
-
25
-
-
85092030453
-
-
One of the best discussions of the notion of “security through obscurity is available on the Wikipedia page for the term. Security through obscurity: (last visited June 14, 2006). Full disclosure: the author is one of the many editors of this Wikipedia page
-
One of the best discussions of the notion of “security through obscurity” is available on the Wikipedia page for the term. See: Security through obscurity: http://en.wikipedia.org/w/index.php?title=Security_through_obscurity&oldid=58172204 (last visited June 14, 2006). Full disclosure: the author is one of the many editors of this Wikipedia page.
-
-
-
-
26
-
-
0033715885
-
Security and source code access: Issues and realities
-
(Washington, DC, USA), IEEE Computer Society
-
Lipner, S. B. Security and source code access: Issues and realities. In SP 00: Proceedings of the 2000 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2000), IEEE Computer Society, p. 124.
-
(2000)
SP 00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 124
-
-
Lipner, S. B.1
-
29
-
-
85092070309
-
-
Inc. CEO, (discussing official's concern and reserving the right to hire an independent expert of their choice to review source code)
-
Linda H. Lamone, Administrator for the Maryland State Board of Elections, letter to Diebold Election Systems, Inc. CEO, available at: http://truevotemd.org/images/stories//ll-diebold.pdf. (discussing official's concern and reserving the right to hire an independent expert of their choice to review source code)
-
Administrator for the Maryland State Board of Elections, letter to Diebold Election Systems
-
-
Lamone, Linda H.1
-
30
-
-
85092065415
-
-
There have also been movements to obviate the need for increased transparency, such as the move to require voter-verified paper records (VVPRs). At the time of writing, there are currently 26 states that have enacted legislation requiring Direct-Recording Electronic voting machines to produce a Voter Verified Paper Record to provide an independent check on the voting system's recording functions. VerifiedVoting.org's Legislation Tracking page
-
There have also been movements to obviate the need for increased transparency, such as the move to require voter-verified paper records (VVPRs). At the time of writing, there are currently 26 states that have enacted legislation requiring Direct-Recording Electronic voting machines to produce a Voter Verified Paper Record to provide an independent check on the voting system's recording functions. See VerifiedVoting.org's Legislation Tracking page: http://verifiedvoting.org/article.php?list=type&type=13.
-
-
-
-
31
-
-
85092048192
-
-
Other provisions relevant to public scrutiny and expert evaluation include: Vendors must establish a California County User Group and hold one annual meeting where the system's users are invited to review the system and give feedback and reliability testing of 100 individual voting machines under election-day conditions, California Secretary of State
-
Other provisions relevant to public scrutiny and expert evaluation include: Vendors must establish a California County User Group and hold one annual meeting where the system's users are invited to review the system and give feedback and volume reliability testing of 100 individual voting machines under election-day conditions. See: California Secretary of State, “10 Voting System Certification Requirements”, available at: http://ss.ca.gov/elections/ voting_systems/vs_factsheet.pdf.
-
10 Voting System Certification Requirements
-
-
-
32
-
-
85092057795
-
[T]he Legislature hereby requests the Secretary of State to investigate and evaluate the use of open-source software in all voting machines in California and report his or her findings and recommendations to the Legislature
-
ACR 242, as chaptered, available here
-
“[T]he Legislature hereby requests the Secretary of State to investigate and evaluate the use of open-source software in all voting machines in California and report his or her findings and recommendations to the Legislature.” See ACR 242, as chaptered, available here: http://www.leginfo.ca.gov/pub/03-04/bill/asm/ab_ 0201-0250/acr_242_bill_20040831_chaptered.html
-
-
-
-
33
-
-
85092045154
-
-
Office of the California Secretary of State, 31 January
-
Office of the California Secretary of State, “Open Source Software in Voting Systems”, 31 January 2006, available at: http://ss.ca.gov/elections/open_source_report.pdf.
-
(2006)
Open Source Software in Voting Systems
-
-
-
35
-
-
85092067832
-
-
163-165.7(c), available as passed by both houses of the NC Legislature here
-
See §163-165.7(c), available as passed by both houses of the NC Legislature here: http://www.ncga.state.nc.us/Sessions/2005/Bills/Senate/HTML/S223v7.html.
-
-
-
-
36
-
-
85092064527
-
-
Diebold Election Systems, Inc. was concerned that, among other things, it didn't have the rights to provide access to the source code of third-party software components of its system. It sued the North Carolina Board of Elections to prevent this regulation from taking effect. The case was dismissed as the Court found that there wa dispute as to the language or interpretation of the statute, unpublished (NC. Super. November 30)
-
Diebold Election Systems, Inc. was concerned that, among other things, it didn't have the rights to provide access to the source code of third-party software components of its system. It sued the North Carolina Board of Elections to prevent this regulation from taking effect. The case was dismissed as the Court found that there was no dispute as to the language or interpretation of the statute. See: Diebold v. North Carolina Board of Elections, unpublished (NC. Super. November 30, 2005), available at: http://www.eff.org/Activism/E-voting/diebold_order_dismissal.pdf.
-
(2005)
Diebold v. North Carolina Board of Elections
-
-
-
38
-
-
85092036412
-
-
Wisconsin Act 92, The author knows of at least eight states with escrow requirements in regulation or statute (CA, CO, IL, MN, NC, UT, WI and WA)
-
Wisconsin Act 92, available at: http://www.legis.state.wi.us/2005/data/acts/05Act92.pdf. The author knows of at least eight states with escrow requirements in regulation or statute (CA, CO, IL, MN, NC, UT, WI and WA).
-
-
-
-
40
-
-
85092023383
-
-
There has bee federal electoral legislation since the passage of HAVA in At the time of writing, there are at least six bills excluding companion bills in the U.S. Congress that would substantially reform the conduct of elections on top of the reforms of HAVA. These six bills are: H.R. 550 (text is)
-
There has been no federal electoral legislation since the passage of HAVA in 2002. At the time of writing, there are at least six bills - excluding companion bills - in the U.S. Congress that would substantially reform the conduct of elections on top of the reforms of HAVA. These six bills are: H.R. 550 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00550:)
-
(2002)
-
-
-
41
-
-
85092071933
-
-
H.R. 704/S. 330 (text is and http://thomas.loc.gov/cgi-bin/query/z?c109:S.330: respectively)
-
H.R. 704/S. 330 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.704: and http://thomas.loc.gov/cgi-bin/query/z?c109:S.330: respectively)
-
-
-
-
42
-
-
85092026089
-
-
H.R. 939/S. 450 (text is and http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00450: respectively
-
H.R. 939/S. 450 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00939: and http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00450: respectively;
-
-
-
-
43
-
-
85092068255
-
-
note the two versions of these bills contain significant differences), H.R. 533/S. 17 (text is and http://thomas.loc.gov/cgi-bin/query/z?c109:S.17: respectively; note the two versions of these bills contain significant differences)
-
note the two versions of these bills contain significant differences), H.R. 533/S. 17 (text is available at: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00533: and http://thomas.loc.gov/cgi-bin/query/z?c109:S.17: respectively; note the two versions of these bills contain significant differences)
-
-
-
-
44
-
-
85092032002
-
-
H.R. 278 (text is)
-
H.R. 278 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.278:)
-
-
-
-
45
-
-
85092060242
-
-
and H.R. 3910 (text is)
-
and H.R. 3910 (text is available at: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.3910:).
-
-
-
-
47
-
-
85092022064
-
-
Speech by Congressman Bob Ney, given at Cleveland State University, Center for Election Integrity on November 30, This sentiment appears to be the main cause behind why none of the six bills in Congress have gained much traction. While wise in some respects, this mindset neglects the fact that the time cycles involved in development of computerized voting equipment are much quicker than the timeframes included as deadlines in the statutes
-
Congressman Bob Ney, former chair of the Committee on House Administration - which has federal election law jurisdiction - has expressed the sentiment that possible election reform should wait for past legislative action to run its course. See: Speech by Congressman Bob Ney, given at Cleveland State University, Center for Election Integrity on November 30, 2005, available at: http://cha.house.gov/MediaPages/PRArticle.aspx?NewsID=1146. This sentiment appears to be the main cause behind why none of the six bills in Congress have gained much traction. While wise in some respects, this mindset neglects the fact that the time cycles involved in development of computerized voting equipment are much quicker than the timeframes included as deadlines in the statutes.
-
(2005)
Congressman Bob Ney, former chair of the Committee on House Administration - which has federal election law jurisdiction - has expressed the sentiment that possible election reform should wait for past legislative action to run its course
-
-
-
48
-
-
85092040456
-
No voting system shall at any time contain or use any undisclosed software
-
The relevant language in both bills is: H.R. 550 §247(c)(1) and H.R. 939/S. 450 §101(c). The one-word difference is that H.R. 550 would allow the disclosure to any “person while H.R. 939/S. 450 only allows disclosure to “citizens
-
The relevant language in both bills is: “No voting system shall at any time contain or use any undisclosed software.” See: H.R. 550 §247(c)(1) and H.R. 939/S. 450 §101(c). The one-word difference is that H.R. 550 would allow the disclosure to any “person” while H.R. 939/S. 450 only allows disclosure to “citizens”.
-
-
-
-
49
-
-
85092044819
-
-
533 §329(a) and §299G
-
H.R. 533 §329(a) and §299G.
-
H.R
-
-
-
50
-
-
85092057671
-
-
For an appreciation of the variety in open source licensing regimes, browse the Open Source Initiative's (OSI) “Approved License list and the Free Software Foundation's web page “Various Licenses and Comments about Them http://www.gnu.org/philosophy/license-list.html
-
For an appreciation of the variety in open source licensing regimes, browse the Open Source Initiative's (OSI) “Approved License” list http://www.opensource.org/licenses and the Free Software Foundation's web page “Various Licenses and Comments about Them” http://www.gnu.org/philosophy/license-list.html.
-
-
-
-
51
-
-
85092050088
-
-
Open source licensing covers many licenses, some of which are incompatible with each other. GNU General Public License: http://www.gnu.org/copyleft/gpl.html
-
Open source licensing covers many licenses, some of which are incompatible with each other. Licenses span a spectrum of very simple - like the modified BSD license: http://www.opensource.org/licenses/bsd-license.php - to the very intricate and complex - like the GNU General Public License: http://www.gnu.org/copyleft/gpl.html.
-
Licenses span a spectrum of very simple - like the modified BSD license
-
-
-
56
-
-
85092049580
-
Fuzz testing” - where software products are bombarded with random input to test reliability - has found that source-available software utilizing open source development techniques is considerably more reliable than closed, proprietary products
-
Lipner, note 30; Technical report, Computer Sciences Department, University of Wisconsin
-
See Lipner, note 30; “Fuzz testing” - where software products are bombarded with random input to test reliability - has found that source-available software utilizing open source development techniques is considerably more reliable than closed, proprietary products. See: B. Miller, D. Koski, C. Lee, V. Maganty, R. Murthy, A. Natarajan and J. Steidl. Fuzz revisited: A re-examination of the reliability of unix utilities and services. Technical report, Computer Sciences Department, University of Wisconsin (1995), available at http://citeseer.ist.psu.edu/miller95fuzz.html
-
(1995)
Fuzz revisited: A re-examination of the reliability of unix utilities and services
-
-
Miller, B.1
Koski, D.2
Lee, C.3
Maganty, V.4
Murthy, R.5
Natarajan, A.6
Steidl, J.7
-
57
-
-
85092064189
-
-
Here are a few examples the Fall of 2004, Diebold sent cease and-desist letters to of students who had published an internal email archive that exposed the fact that Diebold had been using uncertified software on their machines. OPG, Pavlosky & Smith Diebold, 72 U.S.P.Q.2d 1200 (N.D. Cal. Sept. 30) Diebold has also sent letters and a “product use advisory to Florida election officials warning them of intellectual property limitations on the testing of their voting systems in conjunction with other vendors systems. Id., note 23, at 21 North Carolina, in response to the new legislation discussed in §4.3.2, Diebold sued the State Board of Elections arguing that it could not provide source code to third-party software for the evaluation demanded by the new statute note 40)
-
Here are a few examples: In the Fall of 2004, Diebold sent cease- and-desist letters to a number of students who had published an internal email archive that exposed the fact that Diebold had been using uncertified software on their machines. OPG, Pavlosky & Smith v. Diebold, 72 U.S.P.Q.2d 1200 (N.D. Cal. Sept. 30, 2004) available at: http://www.eff.org/legal/ISP_liability/OPG_ v_Diebold/20040930_Diebold_SJ_Order.pdf. Diebold has also sent letters and a “product use advisory” to Florida election officials warning them of intellectual property limitations on the testing of their voting systems in conjunction with other vendors systems. See Id., note 23, at 21. In North Carolina, in response to the new legislation discussed in §4.3.2, Diebold sued the State Board of Elections arguing that it could not provide source code to third-party software for the evaluation demanded by the new statute (see note 40).
-
(2004)
-
-
-
58
-
-
33646075395
-
A model for when disclosure helps security: What is different about computer and network security?
-
Swire develops a model of when disclosing security vulnerabilities will help or hinder system defenders
-
Swire develops a model of when disclosing security vulnerabilities will help or hinder system defenders: Swire, P. P. A model for when disclosure helps security: What is different about computer and network security? 2 Journal on Telecommunications and High Technology Law 163 (2004).
-
(2004)
2 Journal on Telecommunications and High Technology Law
, pp. 163
-
-
Swire, P. P.1
-
59
-
-
85092027085
-
-
There are unanswered questions about whether or not Presidential elections can be postponed without amending the Constitution. Congressional Research Service, October 4
-
There are unanswered questions about whether or not Presidential elections can be postponed without amending the Constitution. See: Congressional Research Service, “Postponement and Rescheduling of Elections to Federal Office”, October 4, 2004: http://www.fas.org/sgp/crs/RL32623.pdf.
-
(2004)
Postponement and Rescheduling of Elections to Federal Office
-
-
-
61
-
-
85092073039
-
-
The first quasi-open source software product to be used in U.S. elections was ChoicePlus by Voting Solutions. This software has been used to administer local-level ranked-ballot elections in Cambridge, MA since 1998 and Burlington, VT. It was planned to be released under the GNU GPL in November of 2003 but one small, proprietary piece of code has prohibited the full release of the software under the GNU GPL. Interview with Steve Willet of Voting Solutions, April 7, 2006, on file with author; Successful public election joins Diebold, free software, NewsForge, April 4, 2006
-
The first quasi-open source software product to be used in U.S. elections was ChoicePlus by Voting Solutions. This software has been used to administer local-level ranked-ballot elections in Cambridge, MA since 1998 and Burlington, VT. It was planned to be released under the GNU GPL in November of 2003 but one small, proprietary piece of code has prohibited the full release of the software under the GNU GPL. Interview with Steve Willet of Voting Solutions, April 7, 2006, on file with author; Jay Lyman, Successful public election joins Diebold, free software, NewsForge, April 4, 2006, available at: http://trends.newsforge.com/article.pl?sid=06/03/23/2040258&tid=136&tid=132.
-
-
-
Lyman, Jay1
-
62
-
-
85092072522
-
-
The following nations have either posted or claim to have posted voting system software in publicly-accessible forums or to select organizations: Argentina, Venezuela, Estonia and Kazakhstan. available (in Spanish) here
-
The following nations have either posted or claim to have posted voting system software in publicly-accessible forums or to select organizations: Argentina, Venezuela, Estonia and Kazakhstan. See: “Publicación de Software y Documentación”, available (in Spanish) here: http://www.buenosaires.gov.ar/dgelec/index.php?module=pruebaPiloto&file=publicacion
-
Publicación de Software y Documentación
-
-
-
64
-
-
85092070696
-
-
(in Estonian): at: http://www.vvk.ee/elektr/dokumendid.htm, Kazakhstan claims to allow review of the source code used to power their voting systems
-
See (in Estonian): http://www.vvk.ee/elektr/docs/Yldkirjeldus-eng.pdf and documentation/software at: http://www.vvk.ee/elektr/dokumendid.htm, Kazakhstan claims to allow review of the source code used to power their voting systems;
-
-
-
-
65
-
-
85092058182
-
-
it is hard to find. The Kazakh elections website (in Cyrillic)
-
it is hard to find. The Kazakh elections website (in Cyrillic): http://election.kz/.
-
-
-
-
67
-
-
85092031229
-
Legal issues relating to free and open source software
-
For example, under §68(1) of Australia's Trade Practices Act of 1974, a disclaimer of warranty is void if it does not follow the particular conventions and wording of the Act
-
For example, under §68(1) of Australia's Trade Practices Act of 1974, a disclaimer of warranty is void if it does not follow the particular conventions and wording of the Act. See: Fitzgerald, B., And Bassett, G. Legal issues relating to free and open source software. Essays in Technology Policy and Law (Queensland University of Technology School of Law) 1 (2003).
-
(2003)
Essays in Technology Policy and Law (Queensland University of Technology School of Law)
, pp. 1
-
-
Fitzgerald, B.1
Bassett, G.2
-
68
-
-
85092058571
-
-
However, as this article goes to press, there are indications that Apple has closed pieces of its software in a strategy to prevent people from running their software on non-Apple hardware. May 17
-
However, as this article goes to press, there are indications that Apple has closed pieces of its software in a strategy to prevent people from running their software on non-Apple hardware. See: Tom Yager, Apple closes down OS X, InfoWorld, May 17, 2006, available at: http://www.infoworld.com/article/06/05/17/78300_21OPcurve_1.html.
-
(2006)
Apple closes down OS X, InfoWorld
-
-
Yager, Tom1
-
69
-
-
11844260026
-
Independent testing of voting systems
-
Coggins, C. Independent testing of voting systems. Communications of the ACM 47:10, 34-38 (2004).
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
, pp. 34-38
-
-
Coggins, C.1
-
71
-
-
33751038992
-
Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or - how to store ballots on a voting machine (extended abstract)
-
Molnar, D., Kohno, T., Sastry, N., And Wagner, D. Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or - how to store ballots on a voting machine (extended abstract). In IEEE Symposium on Security and Privacy (2006).
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Molnar, D.1
Kohno, T.2
Sastry, N.3
Wagner, D.4
-
72
-
-
38849110322
-
Prerendered user interfaces for higher-assurance electronic voting
-
Yee, K.-P., Wagner, D., Hearst, M., And Bellovin, S. Prerendered user interfaces for higher-assurance electronic voting. In USENIX/ACCURATE Electronic Voting Technology Workshop (2006).
-
(2006)
USENIX/ACCURATE Electronic Voting Technology Workshop
-
-
Yee, K.-P.1
Wagner, D.2
Hearst, M.3
Bellovin, S.4
|