Skip to main content

Compliance of POLYAS with the BSI Protection Profile – Basic Requirements for Remote Electronic Voting Systems

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4896)

Abstract

In the past year and a half a group of experts in electronic voting developed a Common Criteria Protection Profile describing basic requirements for remote electronic voting systems. This work was lead-managed by the German Federal Office for Information Security (BSI) and the German Research Center for Artificial Intelligence (DFKI) and initiated by the German Gesellschaft für Informatik (GI - society for informatics). To complete this work Micromata’s POLYAS system, which is used for the GI elections needs to be evaluated against this Protection Profile. As a first step a high-level evaluation based on the security objectives has been carried out. The results are presented in this paper.

Keywords

  • Vote System
  • Vote Process
  • Electoral Register
  • Security Objective
  • Electronic Vote

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-540-77493-8_6
  • Chapter length: 14 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   59.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-77493-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   79.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Website of POLYAS (2007), http://www.polyas.de , retrieved 2007-09-10

  2. Krimmer, R., Volkamer, M.: Bits or Paper? Comparing Remote Electronic Voting to Postal Voting. In: Wimmer, M.A., Traunmüller, R., Grönlund, Å., Andersen, K.V. (eds.) EGOV 2005. LNCS, vol. 3591, pp. 225–232. Springer, Heidelberg (2005)

    Google Scholar 

  3. Grimm, R., Krimmer, R., Meißner, N., Reinhard, K., Volkamer, M., Weinand, M.: Security Requirements for Non-Political Internet Voting. In: Krimmer, R. (ed.) Electronic Voting 2006, vol. P-87, pp. 203–212. Gesellschaft für Informatik, Bonn (2006)

    Google Scholar 

  4. Volkamer, M., Krimmer, R.: Die Online-Wahl auf dem Weg zum Durchbruch. Informatik Spektrum 29(2), 98–113 (2006)

    CrossRef  Google Scholar 

  5. Bundesamt für Sicherheit in der Informationstechnik, Schutzprofil Basissatz von Sicherheitsanforderungen an Onlinewahlprodukte, Bonn (2007)

    Google Scholar 

  6. Common Criteria, Common Criteria for Information Technology Security Evaluation, Version 3.1 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Reinhard, K., Jung, W. (2007). Compliance of POLYAS with the BSI Protection Profile – Basic Requirements for Remote Electronic Voting Systems. In: Alkassar, A., Volkamer, M. (eds) E-Voting and Identity. Vote-ID 2007. Lecture Notes in Computer Science, vol 4896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77493-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77493-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77492-1

  • Online ISBN: 978-3-540-77493-8

  • eBook Packages: Computer ScienceComputer Science (R0)