CSC 379 SUM2008:Week 5, Group 2: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 8: Line 8:


==Introduction==
==Introduction==
:# Thou shalt keep each voter's choices an inviolable secret.
:#Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote [2].
:#Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.
:#Thou shalt report all votes accurately.
:#Thy voting system shall remain operable throughout each election.
:#Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.


==Proprietary Systems==
==Proprietary Systems==

Revision as of 23:00, 8 August 2008

Open Non-Proprietary Technology vs. Closed Proprietary Technology

The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology. On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code. On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them. What bearing does this discussion have on other types of software systems? Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?

Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll). What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications? Are there applications where one or the other should clearly be used? Are there applications for which neither is appropriate? Please explain your answers.

Introduction

  1. Thou shalt keep each voter's choices an inviolable secret.
  2. Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote [2].
  3. Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.
  4. Thou shalt report all votes accurately.
  5. Thy voting system shall remain operable throughout each election.
  6. Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.

Proprietary Systems

Advantages

Disadvantages

Open Source System

Advantages

Disadvantages

Resources