Narrow your search

Library

KU Leuven (9)

VUB (9)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

ULB (8)

ULiège (8)

VIVES (8)

UGent (6)

More...

Resource type

book (19)

digital (5)


Language

English (24)


Year
From To Submit

2023 (2)

2022 (2)

2021 (2)

2020 (3)

2019 (2)

More...
Listing 1 - 10 of 24 << page
of 3
>>
Sort by

Book
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities
Author:
ISBN: 3642016618 9786612297762 1282297767 3642016626 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.

Keywords

Electronic voting --Evaluation. --- Internet voting. --- Electronic voting --- Computer Science --- Political Institutions & Public Administration - General --- Applied Mathematics --- Government - General --- Engineering & Applied Sciences --- Law, Politics & Government --- Evaluation --- Electronic voting. --- Internet --- Political participation --- Political aspects. --- Computer network resources. --- Citizen participation --- Community action --- Community involvement --- Community participation --- Involvement, Community --- Mass political behavior --- Participation, Citizen --- Participation, Community --- Participation, Political --- Political activity --- Political behavior --- Online voting --- Web voting --- E-voting --- eVoting --- Computer security. --- Application software. --- Computers and civilization. --- Law. --- Public law. --- Public administration. --- Economics. --- Public Administration. --- Law, general. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Systems and Data Security. --- Public Law. --- Administration, Public --- Delivery of government services --- Government services, Delivery of --- Public management --- Public sector management --- Political science --- Administrative law --- Decentralization in government --- Local government --- Public officers --- Law --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Political rights --- Social participation --- Political activists --- Politics, Practical --- Voting --- Computer science. --- Information systems. --- Informatics --- Science --- Public law . --- Evaluation. --- Information technology --- Data protection. --- Computer Application in Administrative Data Processing. --- Data and Information Security. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing


Book
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
Author:
ISBN: 9783642016615 Year: 2009 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Evaluation of electronic voting : requirements and evaluation procedures to support responsible election authorities
Author:
Year: 2009 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
E-Voting and Identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
Authors: ---
ISBN: 9783540774938 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Book
Proceedings of the 15th International Conference on Availability, Reliability and Security
Authors: ---
Year: 2020 Publisher: New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the Fifteenth International Conference on Availability, Reliability, and Security (ARES 2020) in its very first all-online edition. ARES brings together researchers and practitioners in the field of availability, reliability, and computer security. The conference highlights various aspects of these, and we are happy to follow the tradition of previous editions to bring together these crucial areas of research.


Book
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities
Authors: ---
ISBN: 9783642016622 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.


Book
E-Voting and Identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
Authors: --- ---
ISBN: 9783540774938 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical,socio-ethicalandlegalrelationsbetween Identity and E-Voting as part of Sirrix's activity in FIDIS. There are many reasons for doing this, e. g. , the open question of the imp- cations of identity and identi?cation to the emerging ?eld of E-Government and E-Democracy, especially E-Voting. Issues to be discussed are from several - mains, e. g. , is identity fraud a crucial matter in E-Voting? What is the trade-o? between anonymity and free speech vs. content-related o?ences? Is it approp- ate to use ID cards or health-insurance cards with digital identities for citizen tasks or voting? What about using SIM cards? Can we employ biometrics for identi?cation purposes with respect to E-Democracy? Last but not least nearly all areas of E-Government rely on a reliable link between the citizens and their governments and administrations. However, in contrast to business processes, the e?ects are much more crucial: Identity fraud may cause more problems than in the business domain; the consequences of misuse cannot be measured just by ?nancial means.

E-Voting and Identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
Authors: --- --- ---
ISBN: 9783540774921 3540774920 3540774939 Year: 2007 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical,socio-ethicalandlegalrelationsbetween Identity and E-Voting as part of Sirrix’s activity in FIDIS. There are many reasons for doing this, e. g. , the open question of the imp- cations of identity and identi?cation to the emerging ?eld of E-Government and E-Democracy, especially E-Voting. Issues to be discussed are from several - mains, e. g. , is identity fraud a crucial matter in E-Voting? What is the trade-o? between anonymity and free speech vs. content-related o?ences? Is it approp- ate to use ID cards or health-insurance cards with digital identities for citizen tasks or voting? What about using SIM cards? Can we employ biometrics for identi?cation purposes with respect to E-Democracy? Last but not least nearly all areas of E-Government rely on a reliable link between the citizens and their governments and administrations. However, in contrast to business processes, the e?ects are much more crucial: Identity fraud may cause more problems than in the business domain; the consequences of misuse cannot be measured just by ?nancial means.

Keywords

Electronic voting --- Voting --- Computer security --- Sécurité informatique --- Congresses. --- Data processing --- Congrès --- Computer Science --- Political Institutions & Public Administration - General --- Government - General --- Engineering & Applied Sciences --- Law, Politics & Government --- Polls --- E-voting --- eVoting --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Database management. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Database Management. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Elections --- Politics, Practical --- Social choice --- Suffrage


Book
Electronic Voting : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 331952240X 3319522396 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions. They represent a wide range of technological proposals for different voting settings (be it in polling stations, remote voting or even mobile voting) and case studies from different countries already using electronic voting or having conducted first trial elections.

Keywords

Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Software engineering. --- Information systems. --- Cryptology. --- Computer software engineering --- Engineering --- Electronic voting --- E-voting --- eVoting --- Voting


Book
Electronic Voting : Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3319686879 3319686860 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017. The 16 full papers presented in this volume were carefully reviewed and selected from 48 submissions. In addition the book contains 3 keynote talks. The papers deal with security, usability and technical issues; administrative, legal, political and social issued; and election and practical experiences. .

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Application software. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Software Engineering. --- Coding and Information Theory. --- Computer Communication Networks. --- Computer Appl. in Administrative Data Processing. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Information systems. --- Cryptology. --- Electronic voting --- E-voting --- eVoting --- Voting --- Information theory. --- Communication theory --- Communication --- Cybernetics

Listing 1 - 10 of 24 << page
of 3
>>
Sort by