Internet voting system security auditing from system development through implementation:Best practices from electronic voting deployments
dc.contributor.author | Aceto, L. Jay | |
dc.contributor.author | Shafer, Michelle M. | |
dc.contributor.author | Smith Ill, Edwin B. | |
dc.contributor.author | Walker, Cyrus J. | |
dc.contributor.editor | Kripp, Manuel J. | |
dc.contributor.editor | Volkamer, Melanie | |
dc.contributor.editor | Grimm, Rüdiger | |
dc.date.accessioned | 2018-11-14T10:53:11Z | |
dc.date.available | 2018-11-14T10:53:11Z | |
dc.date.issued | 2012 | |
dc.description.abstract | There are many security challenges associated with the use of Internet voting solutions. While we are not advocating for the use of Internet voting in this paper, we do assert that if an Internet voting solution is going to be used, its deployment must be undertaken with continuous security auditing in place – security auditing that begins with the development of the Internet voting system by the manufacturer or election jurisdiction and continues throughout the system's use in the field. | en |
dc.identifier.isbn | 978-3-88579-299-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/18209 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | 5th International Conference on Electronic Voting 2012 (EVOTE2012) | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-205 | |
dc.title | Internet voting system security auditing from system development through implementation:Best practices from electronic voting deployments | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 157 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 145 | |
gi.conference.date | July 11-14, 2012 | |
gi.conference.location | Bregenz, Austria | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1