rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642016615

Evaluation of Electronic Voting

by
  • ISBN13:

    9783642016615

  • ISBN10:

    3642016618

  • Format: Paperback
  • Copyright: 2009-06-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.99

Summary

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the application of two available remote e-voting systems to the core Protection Profile.The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting machines.

Table of Contents

Introductionp. 1
Elections and Electronic Votingp. 1
Motivationp. 4
Contribution, Methodology, and Structurep. 5
Fundamentals
Implementations of Electronic Votingp. 13
Classification of Election Formsp. 13
Dimensionsp. 13
Categories of Election Formsp. 14
Multiple Channel Electionsp. 19
Paper-Based Elections versus Electronic Votingp. 19
Examples of Electronic Voting Machinesp. 21
Direct Recording Electronic Voting Machinesp. 21
Digital Election Penp. 22
Overview of Remote Electronic Votingp. 23
Authentication Techniquesp. 25
Techniques to Ensure the Secrecy of the Votep. 27
Client-Side Voting Softwarep. 32
Summaryp. 34
Related Work - A Landscape of Requirement Cataloguesp. 37
Regulations for Electronic Voting Machinesp. 38
German Federal Ordinance for Voting Machinesp. 38
Election Law of the Free and Hanseatic City of Hamburg (Germany)p. 39
American Election Regulationsp. 40
Requirements for Remote Electronic Votingp. 42
Council of Europe Recommendationsp. 42
Online-Voting System Requirements for Non-parliamentary Electionsp. 44
Catalogue of the Gesellschaft füet;r Informatikp. 45
Swiss Election Lawp. 47
Austrian Election Regulationsp. 48
Network Voting System Standardsp. 49
Scientific Papersp. 50
Result of the Analysisp. 55
Summaryp. 56
Requirements
Process and Framework Descriptionp. 61
Description of the Procedurep. 61
Election Principlesp. 65
Threatsp. 67
Syntax and Semanticsp. 67
Beyond the Scopep. 69
Summaryp. 71
Requirements for Electronic Voting Machinesp. 73
Citation and Additional Notationsp. 73
Target of Evaluationp. 74
Security Requirementsp. 75
Security Requirements for the Polling Phasep. 75
Security Requirements for the Tallying Phasep. 77
Functional Requirementsp. 79
Functional Requirements for the Polling Phasep. 79
Functional Requirements for the Tallying Phasep. 83
Functional Requirements for the Audit Systemp. 83
Assurance Requirementsp. 84
Additional Requirementsp. 86
Usability Requirementsp. 86
Operational Requirementsp. 87
Summaryp. 90
Requirements for Remote Electronic Votingp. 93
Citation and Additional Notationsp. 93
Target of Evaluationp. 94
Security Requirementsp. 96
Security Requirements for the Polling Phasep. 96
Security Requirements for the Tallying Phasep. 100
Functional Requirementsp. 101
Functional Requirements for the Polling Phasep. 101
Functional Requirements for the Tallying Phasep. 105
Functional Requirements for the Audit Systemp. 106
Assurance Requirementsp. 107
Additional Requirementsp. 109
Usability Requirementsp. 109
Operational Requirementsp. 110
Summaryp. 113
Evaluation
Evaluation Methodologyp. 117
Common Criteria Introductionp. 118
Discussion of Possible Trust Modelsp. 127
Trustworthy Vote Casting Devicep. 128
Compromising Encryptionsp. 133
Evaluation Assurance Level According to the Requirementsp. 135
Formal IT Security Modelp. 138
General Introductionp. 139
Application of Available IT Security Models for Electionsp. 141
Selection of Security Objectivesp. 141
Formal IT Security Model for Remote Electronic Votingp. 142
Summaryp. 146
Core Protection Profilep. 149
Background, History, Motivation, and Discussionsp. 150
The GI/BSI/DFKI Protection Profilep. 153
Introduction/TOE Overviewp. 153
Conformance Claimsp. 154
Security Problem Definitionp. 156
Security Objectives and Functional Requirementsp. 162
Security Assurance Requirementsp. 163
Comparison, Open Points, and Suggestions for Improvementsp. 164
Introduction/TOE Overviewp. 165
Conformance Claimsp. 166
Security Problem Definitionp. 166
Security Objectives and Functional Requirementsp. 173
Security Assurance Requirementsp. 173
Summaryp. 173
Application
Proof of Conceptp. 177
Procedure Specificationp. 177
The Estonian Systemp. 178
System Descriptionp. 179
System Analysisp. 182
The POLYAS Systemp. 184
System Descriptionp. 185
System Analysisp. 190
Summaryp. 190
Separation of Duty Principlep. 195
Motivationp. 196
'K-resilience' Approachp. 199
Summaryp. 201
Future Work - Open Issuesp. 203
Conclusion
Summary and Concluding Wordsp. 209
Appendix
List of Acronymsp. 217
Linksp. 219
Electronic Voting Systemsp. 219
Electronic Voting Antagonistsp. 220
Glossaryp. 221
Election Terminologyp. 221
Electronic Voting Specific Termsp. 222
Phases of the Electionp. 223
Participantsp. 225
Devices and Componentsp. 225
Assessing Terminologyp. 226
Mapping: PP Glossary - Book Glossaryp. 227
Removed Requirementsp. 229
Protection Profile Structurep. 235
Referencesp. 237
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program