Voting Systems Audit Log StudyDavid WagnerUniversity of California, BerkeleyJune 1, 2010ContentsExecutive Summary 31 Introduction 41.1 Purpose of this study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.2 Scope of this study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.3 The process followed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.4 About the author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Background 62.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.2 How audit logs are used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72.3 Examples of audit logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82.4 Voting system standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82.5 Past use of audit logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Criteria for effective audit logs 143.1 Answers to specific questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143.1.1 What events should be logged? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143.1.2 Are there events that should not be logged for security reasons? . . . . . . . . . . . 183.1.3 Are there events that not be for privacy . . . . . . . . . . . . ...
Voir