Advertisement

Compliance of POLYAS with the BSI Protection Profile – Basic Requirements for Remote Electronic Voting Systems

  • Kai Reinhard
  • Wolfgang Jung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4896)

Abstract

In the past year and a half a group of experts in electronic voting developed a Common Criteria Protection Profile describing basic requirements for remote electronic voting systems. This work was lead-managed by the German Federal Office for Information Security (BSI) and the German Research Center for Artificial Intelligence (DFKI) and initiated by the German Gesellschaft für Informatik (GI - society for informatics). To complete this work Micromata’s POLYAS system, which is used for the GI elections needs to be evaluated against this Protection Profile. As a first step a high-level evaluation based on the security objectives has been carried out. The results are presented in this paper.

Keywords

Vote System Vote Process Electoral Register Security Objective Electronic Vote 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [POLY07]
    Website of POLYAS (2007), http://www.polyas.de, retrieved 2007-09-10
  2. [KrVo05]
    Krimmer, R., Volkamer, M.: Bits or Paper? Comparing Remote Electronic Voting to Postal Voting. In: Wimmer, M.A., Traunmüller, R., Grönlund, Å., Andersen, K.V. (eds.) EGOV 2005. LNCS, vol. 3591, pp. 225–232. Springer, Heidelberg (2005)Google Scholar
  3. [GKMR06]
    Grimm, R., Krimmer, R., Meißner, N., Reinhard, K., Volkamer, M., Weinand, M.: Security Requirements for Non-Political Internet Voting. In: Krimmer, R. (ed.) Electronic Voting 2006, vol. P-87, pp. 203–212. Gesellschaft für Informatik, Bonn (2006)Google Scholar
  4. [VoKr06]
    Volkamer, M., Krimmer, R.: Die Online-Wahl auf dem Weg zum Durchbruch. Informatik Spektrum 29(2), 98–113 (2006)CrossRefGoogle Scholar
  5. [PP07]
    Bundesamt für Sicherheit in der Informationstechnik, Schutzprofil Basissatz von Sicherheitsanforderungen an Onlinewahlprodukte, Bonn (2007)Google Scholar
  6. [CC06]
    Common Criteria, Common Criteria for Information Technology Security Evaluation, Version 3.1 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kai Reinhard
    • 1
  • Wolfgang Jung
    • 1
  1. 1.Micromata ltd., Marie-Calm-Str. 3, 34131 Kassel, Email: polyas@micromata.deGermany

Personalised recommendations