Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities / by Melanie Volkamer.
2009
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Author
Title
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities / by Melanie Volkamer.
Added Corporate Author
Edition
1st ed. 2009.
Imprint
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Description
XIV, 248 p. online resource.
Series
Lecture notes in business information processing. 1865-1348 ; 30.
Formatted Contents Note
I: Fundamentals
Implementations of Electronic Voting
Related Work - A Landscape of Requirement Catalogues
II: Requirements
Process and Framework Description
Requirements for Electronic Voting Machines
Requirements for Remote Electronic Voting
III: Evaluation
Evaluation Methodology
Core Protection Profile
IV: Application
Proof of Concept
Separation of Duty Principle
Future Work - Open Issues
V: Conclusion
Summary and Concluding Words.
Implementations of Electronic Voting
Related Work - A Landscape of Requirement Catalogues
II: Requirements
Process and Framework Description
Requirements for Electronic Voting Machines
Requirements for Remote Electronic Voting
III: Evaluation
Evaluation Methodology
Core Protection Profile
IV: Application
Proof of Concept
Separation of Duty Principle
Future Work - Open Issues
V: Conclusion
Summary and Concluding Words.
Summary
Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.
Location
www
In
Springer Nature eBook
Available in Other Form
Printed edition:
Printed edition:
Printed edition:
Linked Resources
Alternate Title
SpringerLink electronic monographs.
Language
English
ISBN
9783642016622
Record Appears in