Skip to main content
Book cover

Evaluation of Electronic Voting

Requirements and Evaluation Procedures to Support Responsible Election Authorities

  • Book
  • © 2009

Overview

Part of the book series: Lecture Notes in Business Information Processing (LNBIP, volume 30)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (12 chapters)

  1. Introduction

  2. Part I: Fundamentals

  3. Part II: Requirements

  4. Part III: Evaluation

  5. Part IV: Application

  6. Part V: Conclusion

Keywords

About this book

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.

Reviews

From the reviews:

"Electronic voting (e-voting) is an instrument of democracy in an information society … . There aren’t many titles on e-voting available, especially on the evaluation of working systems; this book is a valuable contribution to the literature. I recommend it to readers who are interested in an electoral process based on information and communication technology, and students in the fields of sociology and policy. Information systems professionals may also find it to be a helpful resource on the electoral process and e-voting systems." (F. J. Ruzic, ACM Computing Reviews, October, 2009)

Authors and Affiliations

  • Institute of IT-Security and Security Law, University Passau, Passau, Germany

    Melanie Volkamer

Bibliographic Information

Publish with us