Logo des Repositoriums
 

Internet voting system security auditing from system development through implementation:Best practices from electronic voting deployments

dc.contributor.authorAceto, L. Jay
dc.contributor.authorShafer, Michelle M.
dc.contributor.authorSmith Ill, Edwin B.
dc.contributor.authorWalker, Cyrus J.
dc.contributor.editorKripp, Manuel J.
dc.contributor.editorVolkamer, Melanie
dc.contributor.editorGrimm, Rüdiger
dc.date.accessioned2018-11-14T10:53:11Z
dc.date.available2018-11-14T10:53:11Z
dc.date.issued2012
dc.description.abstractThere are many security challenges associated with the use of Internet voting solutions. While we are not advocating for the use of Internet voting in this paper, we do assert that if an Internet voting solution is going to be used, its deployment must be undertaken with continuous security auditing in place – security auditing that begins with the development of the Internet voting system by the manufacturer or election jurisdiction and continues throughout the system's use in the field.en
dc.identifier.isbn978-3-88579-299-4
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/18209
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartof5th International Conference on Electronic Voting 2012 (EVOTE2012)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-205
dc.titleInternet voting system security auditing from system development through implementation:Best practices from electronic voting deploymentsen
dc.typeText/Conference Paper
gi.citation.endPage157
gi.citation.publisherPlaceBonn
gi.citation.startPage145
gi.conference.dateJuly 11-14, 2012
gi.conference.locationBregenz, Austria
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
145.pdf
Größe:
192.28 KB
Format:
Adobe Portable Document Format