A Structured and Layered Approach for a Modular Electronic Voting System: Defining the Security Service and the Network Access Layers
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: This is the second part of the series of works that attempt to solve the problem of non-modularity in electronic voting systems. The work analyzed the second layer (Security Service layer) of our proposed structured and layered model. The Security Service layer was split into two sub-layers, namely; the Security control &application and the Security infrastructure sub-layers. A complete definition, description and detailed analysis of these sub-layers together with the components and modules that sit in the sub-layers were done. The work identified the Voter authentication module, the Device authentication system and the Information encryption module as the components/modules that are seen in the security control & application sub-layer, while the Token processing system and the Biometric security system were the identifiable components in the security infrastructure sub-layer.
Authors and Affiliations
Emeka Reginald Nwogu , Chinedum E. Ihedigbo
An approach for human gait identification based on area
In recent investigations related to security issues, biometrics plays an important role in recognition of individuals based on their physiological or behavioral characteristics. Gait as a biometric behavioral tra...
Secured Source Anonymous Message Authentication UsingWireless Sensor Network
Abstract: The secured exchange of message was the main concern. To overcome this, message authenticationschemes were developed, to maintain the privacy of message. Message authentication schemes are based onsymmetric key...
Blowfish Algorithm
Abstract: Blowfish is a popular security algorithm that was developed by Bruce Schneier in the advent of the year 1994. The algorithm works on the same line as DES and it consumes block coding with blocks of a size...
Efficient video watermarking with SWT and empirical PCAbased decoding
Abstract: Digital content piracy is one of the major crimes in the present world. Protection of digital content like music, video and images has become a major problem. Watermarking is one of the methods to protect digit...
Survey of different Web Application Attacks & Its Preventive Measures
Securing web is like securing our nation. Our whole world is Internet dependent In each sector internet is very much essential. So, internet security is very much promising task for us. More than 80% attacks are...