German Research Center for Artificial Intelligence Protection Profile for Central Requirements for Online Voting German Research Center for Artificial.

Slides:



Advertisements
Similar presentations
The Public Finance and Empoyment Database of the OECD Dirk Kraan National Accounts Working Party Paris 1 December 2010.
Advertisements

Programme: 145 sessions & social events
United Kingdom New Zealand United Kingdom New Zealand Iceland.
© 2011 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Directorate for Food, Agriculture, and Fisheries 1 OECD SCHEME FOR THE CONTROL OF FOREST REPRODUCTIVE MATERIAL MOVING IN INTERNATIONAL TRADE FAO Committee.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
IT Security Evaluation By Sandeep Joshi
Walter siemens.com SC 27 IT Security Techniques Business Plan & Report on Marketing Initiatives.
EASAC science-policy dialogue project: phase 2 – 2011 Report of phone interviews with Academies Gill Petrokofsky October 2012.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
E-tax system stages 1.Stage 1 - Information: online information about public services 2.Stage 2 - Interaction: downloading of forms 3.Stage 3: Two-way.
Welcome to CERN Research Technology Training Collaborating.
Informatics Online Voting Opportunities and Risks STOA Workshop at the European Parliament Brussels, 17 March 2011 Prof. Dr. Rüdiger Grimm IT Risk Management.
© Lloyd’s Regional Watch Content Guide CLICK ANY BOX AMERICAS IMEA EUROPE ASIA PACIFIC.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Melanie Volkamer (Research Manager) University of Passau, Innstraße 43, Passau, Germany, Tel: / Webpage:
COST 356 EST - Towards the definition of a measurable environmentally sustainable transport CONTACTS Dr Robert Joumard, chairman, INRETS, tel
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
Solution Cloud services and Windows 7 * Pricing may vary by region.
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
A Global Approach for Ex-Products – IECEx UNECE WP.6 Geneva June 2006 Proposal for a new activity: “International legal requirements for explosion.
Secure Information Technology Center - Austria Workshop on the certification of e-voting systems Council of Europe Strasbourg, 26 November 2009 Certification.
OECD Review of Russian Statistics Peer Review Mission to Russia April 2012 Tim Davis Head, Global Relations, Statistics Directorate.
GLP & Quality Assurance
Environmental issues and local development Partnerships and the Green Economy Styria, 11 th October 2010 Gabriela Miranda
Conformity Assessment and Accreditation Mike Peet Chief Executive Officer South African National Accreditation System.
Common Criteria Recognition Arrangement 8 th ICCC Rome, 25 th September 2007 Report by the MC Chairman Gen. Luigi Palagiano.
Brokerage Event 2014 Barcelona, February, Fira de Barcelona At a Glance.
Rackspace Analyst Event Tim Bell
You say to-mah-to, I say to-mae-to: why isn’t there a single solution to Information Security Assurance? Apostol Vassilev atsec information security &
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
1 The report on the scope of e-voting in elections Marianne Riise, senior adviser Strasbourg 23 and 24 November 2006 The Ministry of Local Government and.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
National Safer Internet Center Bulgarian example for public private partnership.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Information Security Systems Cost Effective Authenticity & Integrity in CEN/FISCALIS eInvoicing Good Practice Guidelines Nick Pope – Principal Consultant,
A Business Excellence Solutions Group. This Presentation Company Profile NGG Automotive Solutions NGG Learning & Management Automotive Solutions Portfolio.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Evaluation of an E-Voting Device based on a Common Criteria Protection Profile Roland Vogt, DFKI GmbH Dr. Sönke Maseberg, datenschutz nord GmbH 8th ICCC,
Office 365 Education E5 Overview for Partners April 2016 Microsoft Confidential: Partner use only.
Global Aluminium Pipe and Tube Market to 2018 (Market Size, Growth, and Forecasts in Nearly 60 Countries) Published Date: Jul-2014 Reports and Intelligence.
IEC System of Conformity Assessment Schemes for Electrotechnical Equipment and Components.
Chief Accounting Officers Database List A chief accounting officer or a CAO plays a vital role in the organization as he/she is responsible for.
IEC System of Conformity Assessment Schemes for Electrotechnical Equipment and Components.
Presented By: Manish Gidwani 10 Kapil Israni 16
With Global B2B Contacts COO mailing list, you can effectively reach the COO.
Global Golf Equipment Market to 2019 The report focuses on global major leading industry players with information such as company profiles, product picture.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Best Sustainable Development Practices for Food Security UV-B radiation: A Specific Regulator of Plant Growth and Food Quality in a Changing Climate The.
Tax Policy Challenges in a Changing World. Unintended Consequences of Tax Rob Marston, “Window Tax”, 1 September 2010 uploaded via Flickr, creative commons.
NSO data collections of subjective well-being
SAP Digital Business Services June 2016
CS457 Introduction to Information Security Systems
Certification CS-100/ CSE-200 /CSC-1
Electrification Products
A Global Approach for Ex-Products
Best Practices in STANAG 6001 Testing
The Public Finance and Empoyment Database of the OECD Dirk Kraan National Accounts Working Party Paris 1 December 2010.
The Italian Academic Community’s Electronic Voting System
Security in SDR & cognitive radio
Electrification business
Presentation transcript:

German Research Center for Artificial Intelligence Protection Profile for Central Requirements for Online Voting German Research Center for Artificial Intelligence (DFKI GmbH) Saarbrücken, Germany Melanie Volkamer Deutsches Forschungszentrum für Künstliche Intelligenz

German Research Center for Artificial IntelligenceOverview Project formation Introduction to the Common Criteria  Protection Profiles Project –General information (duration, statues, …) –Content (assumptions, threats, objectives, EAL, …) –Challenges Relation to the CoE recommendations

German Research Center for Artificial Intelligence Project Formation First online election in the GI in 2004 Development of a requirement catalogue in 2005 –Based on the CoE recommendation and the PTB catalogue –How to evaluate the system against it? By whom?  Common Criteria / Protection Profile Building up a PP GI group leaded by Prof. Grimm Involving M. Weinand (BSI) – CC expertise Project at the DFKI underwritten by the BSI –Funding for development, evaluation and certification

German Research Center for Artificial Intelligence Introduction to the CC International standard (ISO/IEC15408) for Information Technology Security Evaluation (CC) Australia, Canada, France, Germany, Japan, Republic of Korea, The Netherlands, New Zealand, Norway, Spain, United Kingdom, United States of America; Austria, Czech Republic, Denmark, Greece, Hungary, India, Israel Italy, Republic of Singapore, Sweden, Turkey Idea: confidence to IT security through actions taken during development, evaluation + operation 4 groups: customers, developers, evaluators, certification authority 3 parts: intro, security, assurance requirements Implementation-independent statement of security needs for a IT system/product

German Research Center for Artificial Intelligence Protection Profile EAL 1-7 EAL 1-7 EAL-1: functional testing EAL-1: functional testing EAL-4: methodically designed, tested and reviewed EAL-4: methodically designed, tested and reviewed EAL-7:formaly verified design and tested EAL-7:formaly verified design and tested

German Research Center for Artificial Intelligence General Information Project 1: PP for Online Voting- voting period –Starting at the end of 2005, deadline Sep –Analyzing: CoE, PTB and GI catalogue –Advisory Board: Researchers: Koblenz, Gießen, Wien, … User: GI, Ministry of workers & social affairs, … Companies: Micromata, T-Systems, Scytl, … Others: CoE, e-Voting.cc, PTB, ASIT, BSI, … –2 meetings and 2 annotation phases –Cooperation between BSI and GI

German Research Center for Artificial Intelligence General Information (2) Project 2: result calculation, CC 3.1, English version –Current state: Extension for result calculation Change to CC 3.1 PP is in the Evaluation process (Testing Authority: SRC) –GI is planning to charge the certification Project 3: ?? PP for robust Online Voting Systems ?? –More requirements to the ToE –Taking Observation into account –….

German Research Center for Artificial Intelligence Content - Assumptions Information about intended use –Election data are properly installed on the ToE –The election committee uses only the ToE functions –Nobody is watching the vote while he votes –Voter knows how to deal with his means of identification and authentication and is consistent in doing so Information about the environment –Client device (voter’s responsibility)/ election server is trustworthy –Network and election server are available –Only the election committee has access to the election server –Storage hardware is functioning correctly. –The correct time source is available

German Research Center for Artificial Intelligence Content Threats Unauthorised users cast a vote Voters use data on their clients to prove their vote Network attackers –delete/add/alter msgs to change results –read msgs to break election secrecy –redirect the voter to a faked server Persons with access to the data stored on the ToE after the counting can –change the stored data –break election secrecy

German Research Center for Artificial Intelligence Organizational Security Policies Functionality of cancelling the vote Functionality to prevent the EC to accidentally close the poll Functionality to prevent voters from accidentally cast a ballot Functionality to correct vote before casting Functionality of a confirmation (vote was stored successfully) Functionality for the EC to recognise disruptions Functionality of logging specified actions Functionality to ensure one voter one vote principle Functionality to accurately count all stored vote

German Research Center for Artificial Intelligence Organizational Security Policies (2) No Functionality for EC to break the election secrecy No Functionality for EC to add/remote/alter votes No Functionality for a restart after closing the poll. No Functionality to compute intermediate results No Functionality to read authentication tokens No votes are accepted after closing the poll Access control mechanisms support a separation of duty

German Research Center for Artificial Intelligence EAL 2

German Research Center for Artificial Intelligence Relation to the CoE Classification of CoE according different categories –Functional security  Functional Security Requirements Security Functionality Usability –Organizational  Appendix B –Auditing  Project 3 –Assurance  EAL 2 Manufactory Evaluator (not Source Code)

German Research Center for Artificial IntelligenceConclusion Intention of certified products –Arising convenience by the voter –Why not for all kind of elections? Next steps? –Evaluation and certification of systems –Work in progress –More “robust” protection profile  discussions about content How to integrate the PP into the law?

German Research Center for Artificial Intelligence Thank you for your attention! General Contact Protection Profile as an (Subject: Protection Profile in English)