The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance 2012
DOI: 10.1145/2463728.2463807
|View full text |Cite
|
Sign up to set email alerts
|

The secure platform problem taxonomy and analysis of existing proposals to address this problem

Abstract: One of the main open issues in electronic government is the fact that the individual users' multi-purpose computing platforms are used. In terms of security, no guarantee is given since these platforms are not under the government authority's control. Even worse, the number of malware infected computing platforms increases. This so-called Secure Platform Problem and approaches aiming to solve it are objects of investigation in this work. We define criteria that need to be ensured to address this problem. Furth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Recall that Rule (1) is the only rule producing fresh constants and thereby creating Fr facts. By Equation (23), every fresh constant is produced at most once in a trace. Fresh constants can be obtained (generated) by honest agents using Rule (2).…”
Section: B Extended Model Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recall that Rule (1) is the only rule producing fresh constants and thereby creating Fr facts. By Equation (23), every fresh constant is produced at most once in a trace. Fresh constants can be obtained (generated) by honest agents using Rule (2).…”
Section: B Extended Model Detailsmentioning
confidence: 99%
“…Most existing work focuses on particular scenarios, for instance on browserbased security protocols [12], [13], login procedures [14], solutions for online banking [27], or Internet voting [23]. A general approach to modeling and reasoning about such systems are security ceremonies [9].…”
Section: Introductionmentioning
confidence: 99%
“…A message utilizing images, sound or video would be very effective but would have to be delivered via a supporting platform. Unfortunately there is always the possibility that the voting platform has been compromised [50], thus delivering instructional messages this way seems insecure 2 . Hence we designed messages which could easily be delivered via a secure channel (e.g.…”
Section: B Developing Behaviour-change Messagesmentioning
confidence: 99%