Catalog Search Results
Author
Pub. Date
2008.
Description
The major deficiencies identified for Election Systems & Software were failure to detect election programming changes and errors; inability to determine if tabulation software worked correctly; inability to complete testing threshold of 10,000 ballots due to vendor programming errors; system vulnerable to security attack; and failure to provide auditable data to detect security violations.
14) Airman
Author
Accelerated Reader
IL: MG - BL: 5.8 - AR Pts: 16
Formats
Description
In the late nineteenth century, when Conor Broekhart discovers a conspiracy to overthrow the king, he is branded a traitor, imprisoned, and forced to mine for diamonds under brutal conditions while he plans a daring escape from Little Saltee prison by way of a flying machine that he must design, build, and, hardest of all, trust to carry him to safety.
Author
Pub. Date
2013.
Description
The State of Colorado, with 64 counties responsible for conducting elections has a wide array of equipment for voting, vote tabulation, voter registration entry, voter registration scanning, ballot scanning and signature verification. Counties are responsible for the purchase and maintenance of such equipment.
Author
Pub. Date
2013.
Description
Colorado House Bill 13-1303, the Voter Access and Modernized Elections Act (the Act), was signed into law and went into effect on May 10, 2013. The stated intent of the Act is to remove barriers to the electoral process by making both voting and voter registration more convenient and accessible. The Act allows eligible citizens to register and vote up to, and on, Election Day, expands the use of mail ballot elections and establishes Voter to, and...
Pub. Date
[2019]
Description
A trusted build (or trusted compilation) is a build performed with adequate security measures implemented to give confidence that the executable code is a verifiable and faithful representation of the source code. The primary function of a trusted build is to create a chain of evidence which allows stakeholders to have an approved model to use for verification of a voting system.