Proof of concept

0Citations
Citations of this article
144Readers
Mendeley users who have this article in their library.

Abstract

The previous part discusses the GI/BSI/DFKI Protection Profile which constitutes after the implementation of the identified improvements as the proposed evaluation methodology for remote electronic voting systems. The result can now be applied to available systems. Currently, there is no system that has been evaluated against the GI/BSI/DFKI Protection Profile or even against the improved version. This chapter aims to gain experiences with the application of this evaluation framework. Thus, the Estonian system and the POLYAS system are analysed with respect to this framework. Due to space and time constrains, no complete Common Criteria evaluation has been undertaken. It has been decided to evaluate against the security problem definition retrieved from the extended and improved core Protection Profile as described in the previous chapter. This analysis is based on a system description deduced from available documents. The result is provided in this chapter.

Cite

CITATION STYLE

APA

Volkamer, M. (2009). Proof of concept. In Lecture Notes in Business Information Processing (Vol. 30, pp. 177–193). Springer Verlag. https://doi.org/10.12968/nuwa.2023.3.22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free