The goal of this book is to develop a trustworthy base for electronic voting by providing an evaluation and certification framework based on • a standardised, consistent, and exhaustive list of security, functional, usability, organisational, and assurance requirements, and • a standardised evaluation methodology which – supports the defined security, functional, and assurance requirements, – is flexible with respect to different trust models (including assumptions for the environment, the intruder’s technical capability, and entities that do not maliciously cooperate), – is flexible regarding different evaluation depths, and – produces impartial, comparable, and repeatable evaluation results by providing a guideline for the evaluator.
CITATION STYLE
Volkamer, M. (2009). Summary and concluding words. In Lecture Notes in Business Information Processing (Vol. 30, pp. 209–213). Springer Verlag. https://doi.org/10.1007/978-3-642-01662-2_12
Mendeley helps you to discover research relevant for your work.