000 | 03710nam a22003735i 4500 | ||
---|---|---|---|
001 | 299699 | ||
003 | MX-SnUAN | ||
005 | 20170705134248.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 gw | o |||| 0|eng d | ||
020 |
_a9783642016622 _99783642016622 |
||
024 | 7 |
_a10.1007/9783642016622 _2doi |
|
035 | _avtls000353142 | ||
039 | 9 |
_a201509030522 _bVLOAD _c201405060316 _dVLOAD _y201402180937 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.76.A65 | |
100 | 1 |
_aVolkamer, Melanie. _eautor _9333943 |
|
245 | 1 | 0 |
_aEvaluation of Electronic Voting : _bRequirements and Evaluation Procedures to Support Responsible Election Authorities / _cby Melanie Volkamer. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Business Information Processing, _x1865-1348 ; _v30 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aI: Fundamentals -- Implementations of Electronic Voting -- Related Work – A Landscape of Requirement Catalogues -- II: Requirements -- Process and Framework Description -- Requirements for Electronic Voting Machines -- Requirements for Remote Electronic Voting -- III: Evaluation -- Evaluation Methodology -- Core Protection Profile -- IV: Application -- Proof of Concept -- Separation of Duty Principle -- Future Work – Open Issues -- V: Conclusion -- Summary and Concluding Words. | |
520 | _aElectronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642016615 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-01662-2 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c299699 _d299699 |