Sept. 20, 2023, 1:10 a.m. | Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson

cs.CR updates on arXiv.org arxiv.org

Assessing and comparing the security level of different voting systems is
non-trivial as the technical means provided for and societal assumptions made
about various systems differ significantly. However, trust assumptions
concerning the involved parties are present for all voting systems and can be
used as a basis for comparison. This paper discusses eight concrete voting
systems with different properties, 12 types of parties involved, and seven
general security goals set for voting. The emerging trust relations are
assessed for their …

non security systems technical trust voting voting systems

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France