Int. J. of Wireless and Mobile Computing   »   2014 Vol.7, No.4

 

 

Title: Security requirements engineering for specifying security requirements of an e-voting system as a legitimate solution to e-governance

 

Authors: P. Salini; S. Kanmani

 

Addresses:
Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry 605014, India
Department of Information Technology, Pondicherry Engineering College, Puducherry 605014, India

 

Abstract: The changes in technology have put an increased pressure on e-governance to modernise its election process. In India, after several elections, we have noticed many problems such as long lines, sensitive polling booth and other polling problems. As a solution, we have moved to the electronic electoral process throughout the country, but a recent study revealed that various e-voting systems show serious failure due to specification, design and implementation flaws. In this paper, we propose to consider security requirements as functional requirements and security requirements engineering process in the early phases of e-voting system development as a legitimate solution for e-governance. As the result of adopting model-oriented security requirements engineering framework, the security requirements specification was complete and correct. High level of security was achieved by identifying more traces of vulnerabilities in turn identifying and specifying security requirements for e-voting system at the early phases of the software development life cycle.

 

Keywords: e-governance; e-voting; security requirements engineering; threats; vulnerabilities; electronic voting; electronic governance; e-democracy; electronic democracy; India; security requirements specification; voting security.

 

DOI: 10.1504/IJWMC.2014.063083

 

Int. J. of Wireless and Mobile Computing, 2014 Vol.7, No.4, pp.400 - 413

 

Submission date: 28 Dec 2012
Date of acceptance: 16 Jul 2013
Available online: 27 Jun 2014

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article