Core protection profile

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Chap. 6, a list of requirements for remote electronic voting systems is provided as well as the exact definition of the addressed target of evaluation. Moreover, in Chap. 7, the Common Criteria is identified as an appropriate evaluation technique for remote electronic voting systems. In this chapter, the first step to apply the Common Criteria for remote electronic voting systems is taken by bridging from the book’s syntax to the Common Criteria vocabulary, by discussing different trust models, and by mapping the assurance requirements from Sect. 6.5 to a Common Criteria evaluation assurance level.

Cite

CITATION STYLE

APA

Volkamer, M. (2009). Core protection profile. In Lecture Notes in Business Information Processing (Vol. 30, pp. 149–174). Springer Verlag. https://doi.org/10.1007/978-3-642-01662-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free