Evaluation of Electronic Voting

Requirements and Evaluation Procedures to Support Responsible Election Authorities

  • Melanie Volkamer

Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 30)

Table of contents

  1. Front Matter
  2. Introduction

    1. Melanie Volkamer
      Pages 1-10
  3. Part I: Fundamentals

    1. Front Matter
      Pages 11-11
    2. Melanie Volkamer
      Pages 13-35
  4. Part II: Requirements

    1. Front Matter
      Pages 59-59
    2. Melanie Volkamer
      Pages 61-72
    3. Melanie Volkamer
      Pages 73-91
    4. Melanie Volkamer
      Pages 93-113
  5. Part III: Evaluation

    1. Front Matter
      Pages 115-115
    2. Melanie Volkamer
      Pages 117-147
    3. Melanie Volkamer
      Pages 149-174
  6. Part IV: Application

    1. Front Matter
      Pages 175-175
    2. Melanie Volkamer
      Pages 177-193
    3. Melanie Volkamer
      Pages 195-202
    4. Melanie Volkamer
      Pages 203-206
  7. Part V: Conclusion

    1. Front Matter
      Pages 207-207
    2. Melanie Volkamer
      Pages 209-213
  8. Back Matter

About this book

Introduction

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.

Keywords

IT applications in law IT security electronic voting information technology requirements engineering security trust

Authors and affiliations

  • Melanie Volkamer
    • 1
  1. 1.Institute of IT-Security and Security LawUniversity PassauPassauGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-01662-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01661-5
  • Online ISBN 978-3-642-01662-2
  • Series Print ISSN 1865-1348
  • Series Online ISSN 1865-1356
  • About this book