Development of A Formal Security Model for Electronic Voting Systems

Development of A Formal Security Model for Electronic Voting Systems

Katharina Bräunlich, Rüdiger Grimm
Copyright: © 2013 |Volume: 7 |Issue: 2 |Pages: 28
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466632639|DOI: 10.4018/jisp.2013040101
Cite Article Cite Article

MLA

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." IJISP vol.7, no.2 2013: pp.1-28. http://doi.org/10.4018/jisp.2013040101

APA

Bräunlich, K. & Grimm, R. (2013). Development of A Formal Security Model for Electronic Voting Systems. International Journal of Information Security and Privacy (IJISP), 7(2), 1-28. http://doi.org/10.4018/jisp.2013040101

Chicago

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems," International Journal of Information Security and Privacy (IJISP) 7, no.2: 1-28. http://doi.org/10.4018/jisp.2013040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.