Abstract
The previous part discusses the GI/BSI/DFKI Protection Profile which constitutes after the implementation of the identified improvements as the proposed evaluation methodology for remote electronic voting systems. The result can now be applied to available systems. Currently, there is no system that has been evaluated against the GI/BSI/DFKI Protection Profile or even against the improved version.
This chapter aims to gain experiences with the application of this evaluation framework. Thus, the Estonian system and the POLYAS system are analysed with respect to this framework. Due to space and time constrains, no complete Common Criteria evaluation has been undertaken. It has been decided to evaluate against the security problem definition retrieved from the extended and improved core Protection Profile as described in the previous chapter. This analysis is based on a system description deduced from available documents. The result is provided in this chapter.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Volkamer, M. (2009). Proof of Concept. In: Evaluation of Electronic Voting. Lecture Notes in Business Information Processing, vol 30. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01662-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-01662-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01661-5
Online ISBN: 978-3-642-01662-2
eBook Packages: Computer ScienceComputer Science (R0)