By Melanie Volkamer
Electronic vote casting has a tender and engaging background, either within the layout of easy cryptographic tools and protocols and within the software via groups who're within the forefront of applied sciences. The the most important point of defense for digital balloting structures is topic to analyze through machine scientists in addition to through criminal, social and political scientists. the basic query is easy methods to supply a reliable base for safe digital balloting, and as a result the best way to hinder unintentional or malicious abuse of digital balloting in elections.
To deal with this challenge, Volkamer established her paintings into 4 components: "Fundamentals" offers an creation to the correct problems with digital balloting. "Requirements" contributes a standardized, constant, and exhaustive record of necessities for e-voting structures. "Evaluation" provides the concept and dialogue of a standardized overview method and certification strategy known as a center defense Profile. ultimately, "Application" describes the review of 2 to be had distant digital vote casting platforms in accordance with the middle safeguard Profile.
The effects awarded are in response to theoretical issues in addition to on sensible adventure. in response to the German Society of computing device Scientists, Volkamer succeeded in specifying a "Protection Profile for a uncomplicated Set of safety standards for on-line balloting Products," which has been qualified via the German Federal workplace for safeguard in info know-how. Her e-book is of curiosity not just to builders of security-critical structures, but in addition to attorneys, defense officials, and politicians all for the advent or certification of digital vote casting systems.
Read Online or Download Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities PDF
Similar network security books
Juniper Networks safe entry SSL VPN home equipment offer an entire diversity of distant entry home equipment for the smallest businesses as much as the most important carrier prone. As a approach administrator or protection specialist, this complete configuration advisor will let you configure those home equipment to permit distant and cellular entry for staff.
This SpringerBrief explains the rising cyber threats that undermine Android software safety. It extra explores the chance to leverage the state-of-the-art semantics and context–aware suggestions to shield opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate protection warnings in app descriptions.
Create acceptable, security-focused company propositions that think of the stability among price, hazard, and value, whereas beginning your trip to turn into a knowledge protection supervisor. protecting a wealth of knowledge that explains precisely how the works this day, this ebook makes a speciality of how one can arrange an efficient info protection perform, lease the correct humans, and strike the simplest stability among safeguard controls, bills, and dangers.
- Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
- Security Operations Center: Building, Operating, and Maintaining your SOC
- Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace
- Agile IT Security Implementation Methodology
- Transactions on Computational Science XXVI: Special Issue on Cyberworlds and Cybersecurity
Additional resources for Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
1). Separation of Duty. The separation of duty approach also works with at least two voting servers, one inspecting the right to vote and another one storing the eligible e-votes. The voter authenticates himself to the ﬁrst server. In case that he has the right to vote, he receives a random number generated by this ﬁrst server. This random number is also sent to the second voting server but without any information about the voter’s ID. Now the voter uses this random number to authenticate himself as an eligible voter to the second voting server to which he sends his vote in the next step.
From a usability point of view, the Web browser solution is welcomed because the voter does not need to install additional software but can use the environment he is used to. Moreover, Web browsers are executable on other devices than normal PCs or notebooks; the voter can also use his WAP mobile phone or PDA to cast his vote using the remote electronic voting system. Concentrating the whole functionality on the server-side has two more advantages: ﬁrst of all, in the case of a voting system update there is no eﬀort for the voter because only the server-side voting software needs to be updated.
20 2 Implementations of Electronic Voting without an established technical and cryptographic background, an attacker has no chance to manipulate an electronic voting system. The degree of damage an attacker can inﬂict, is exactly the reverse case: while within paper-based systems only small alterations to the election result are possible, an attack against an electronic voting system and in particular a remote electronic voting system can manipulate the entire election result. In paper-based systems one person could, for example, add or delete votes in one polling station (if the poll workers agree by unfair means) or delete postal votes in one district.