Abstract
The previous part discusses the GI/BSI/DFKI Protection Profile which constitutes after the implementation of the identified improvements as the proposed evaluation methodology for remote electronic voting systems. The result can now be applied to available systems. Currently, there is no system that has been evaluated against the GI/BSI/DFKI Protection Profile or even against the improved version. This chapter aims to gain experiences with the application of this evaluation framework. Thus, the Estonian system and the POLYAS system are analysed with respect to this framework. Due to space and time constrains, no complete Common Criteria evaluation has been undertaken. It has been decided to evaluate against the security problem definition retrieved from the extended and improved core Protection Profile as described in the previous chapter. This analysis is based on a system description deduced from available documents. The result is provided in this chapter.
Cite
CITATION STYLE
Volkamer, M. (2009). Proof of concept. In Lecture Notes in Business Information Processing (Vol. 30, pp. 177–193). Springer Verlag. https://doi.org/10.12968/nuwa.2023.3.22
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.