Online Library TheLib.net » Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
cover of the book Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities

Ebook: Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities

00
27.01.2024
0
0

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.




Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.




Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.


Content:
Front Matter....Pages -
Introduction....Pages 1-10
Front Matter....Pages 11-11
Implementations of Electronic Voting....Pages 13-35
Related Work – A Landscape of Requirement Catalogues....Pages 37-57
Front Matter....Pages 59-59
Process and Framework Description....Pages 61-72
Requirements for Electronic Voting Machines....Pages 73-91
Requirements for Remote Electronic Voting....Pages 93-113
Front Matter....Pages 115-115
Evaluation Methodology....Pages 117-147
Core Protection Profile....Pages 149-174
Front Matter....Pages 175-175
Proof of Concept....Pages 177-193
Separation of Duty Principle....Pages 195-202
Future Work – Open Issues....Pages 203-206
Front Matter....Pages 207-207
Summary and Concluding Words....Pages 209-213
Back Matter....Pages -


Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.


Content:
Front Matter....Pages -
Introduction....Pages 1-10
Front Matter....Pages 11-11
Implementations of Electronic Voting....Pages 13-35
Related Work – A Landscape of Requirement Catalogues....Pages 37-57
Front Matter....Pages 59-59
Process and Framework Description....Pages 61-72
Requirements for Electronic Voting Machines....Pages 73-91
Requirements for Remote Electronic Voting....Pages 93-113
Front Matter....Pages 115-115
Evaluation Methodology....Pages 117-147
Core Protection Profile....Pages 149-174
Front Matter....Pages 175-175
Proof of Concept....Pages 177-193
Separation of Duty Principle....Pages 195-202
Future Work – Open Issues....Pages 203-206
Front Matter....Pages 207-207
Summary and Concluding Words....Pages 209-213
Back Matter....Pages -
....
Download the book Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen