Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Richard FranklandDenise DemirelJurlind BudurushiMelanie VolkamerPublished in: REVOTE (2011)
Keyphrases
- information security
- security issues
- security vulnerabilities
- functional requirements
- security mechanisms
- security risks
- security breaches
- security threats
- intrusion detection
- countermeasures
- information systems
- security patterns
- security requirements
- buffer overflow
- security systems
- multi channel
- security problems
- access control
- security policies
- security analysis
- security properties
- computer security
- authentication protocol
- requirements engineering
- security level
- batch processing
- sensitive data
- development process
- software development
- statistical databases
- database systems
- attack scenarios
- network security