Security requirements engineering for specifying security requirements of an e-voting system as a legitimate solution to e-governance Online publication date: Fri, 31-Oct-2014
by P. Salini; S. Kanmani
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 7, No. 4, 2014
Abstract: The changes in technology have put an increased pressure on e-governance to modernise its election process. In India, after several elections, we have noticed many problems such as long lines, sensitive polling booth and other polling problems. As a solution, we have moved to the electronic electoral process throughout the country, but a recent study revealed that various e-voting systems show serious failure due to specification, design and implementation flaws. In this paper, we propose to consider security requirements as functional requirements and security requirements engineering process in the early phases of e-voting system development as a legitimate solution for e-governance. As the result of adopting model-oriented security requirements engineering framework, the security requirements specification was complete and correct. High level of security was achieved by identifying more traces of vulnerabilities in turn identifying and specifying security requirements for e-voting system at the early phases of the software development life cycle.
Online publication date: Fri, 31-Oct-2014
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org