In Chap. 6, a list of requirements for remote electronic voting systems is provided as well as the exact definition of the addressed target of evaluation. Moreover, in Chap. 7, the Common Criteria is identified as an appropriate evaluation technique for remote electronic voting systems. In this chapter, the first step to apply the Common Criteria for remote electronic voting systems is taken by bridging from the book’s syntax to the Common Criteria vocabulary, by discussing different trust models, and by mapping the assurance requirements from Sect. 6.5 to a Common Criteria evaluation assurance level.
CITATION STYLE
Volkamer, M. (2009). Core protection profile. In Lecture Notes in Business Information Processing (Vol. 30, pp. 149–174). Springer Verlag. https://doi.org/10.1007/978-3-642-01662-2_8
Mendeley helps you to discover research relevant for your work.