Compliance of POLYAS with the Common Criteria Protection Profile

نویسندگان

  • Niels Menke
  • Kai Reinhard
چکیده

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection profile and worked toward fulfilling the given requirements. In this article we present the findings of the process of creating a compliant security target, necessary restrictions and assumptions to the system design as well as the workings of the committee, and architectural and procedural changes made necessary.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 Outlook on Certified Remote Electronic Voting

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...

متن کامل

Extending Linux for Multi-Level Security

LinuxTM distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an Open Source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost two years. Developm...

متن کامل

بررسی میزان رعایت استانداردهای حفاظتی در بخش های پرتونگاری تشخیصی استان خوزستان در سال1394

Introduction and purpose: The growing use of ionizing radiation in disease diagnosis necessitaes the appropriate use of devices and awareness regarding the principles of radiation protection. With appropriate adoption of personal protection equipment and compliance with the existing regulations in relation to protection of the buildings where sources of ionizing radiation ar...

متن کامل

Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------------Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment...

متن کامل

White Paper: Infineon Trusted Platform Module Security Conformance

To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1012.4204  شماره 

صفحات  -

تاریخ انتشار 2010