Check out the new USENIX Web site.

Bibliography

1
Adolfo Villafiorita and Giorgia Fasanelli.
Transitioning to e-Voting: the ProVotE Project and the Trentino's Experience.
In EGOV-06, Krakow, Poland, 2006.

2
Bernard van Acker.
Remote e-Voting and Coercion: a Risk-Assessment Model and Soluions.
In Prosser and Krimmer [28], pages 53-62.

3
T. Kohno, A. Stubblefield, A.D. Rubin, and D.S. Wallach.
Analysis of an Electronic Voting System.
In IEEE Symposium on Security and Privacy, 2004.

4
J W. Bryans, B Littlewood, P Y. A. Ryan, and L Strigini.
E-voting: Dependability Requirements and Design for Dependability.
In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security, pages 988-995, Washington, DC, USA, 2006. IEEE Computer Society.

5
Matt Bishop and David Wagner.
Risks of e-voting.
Commun. ACM, 50(11):120-120, 2007.

6
Ryan Gardner and Sujata Garera and Aviel D. Rubin.
On the Difficulty of Validating Voting Machine Software with Software.
In EVT'07: Proceedings of the USENIX/Accurate Electronic Voting Technology on USENIX/Accurate Electronic Voting Technology Workshop, pages 11-11, Berkeley, CA, USA, 2007. USENIX Association.

7
P. McDaniel, M. Blaze, and G. Vigna.
EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing.
Ohio Secretary of State's EVEREST Project Report, December 2007.

8
Igor Nai Fovino and Marcelo Masera.
Through the Description of Attacks: A Multidimensional View.
In Janusz Górski, editor, SAFECOMP, volume 4166 of Lecture Notes in Computer Science, pages 15-28. Springer, 2006.

9
David Basin, Jürgen Doser, and Torsten Lodderstedt.
Model Driven Security for Process-Oriented Systems.
In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 100-109, New York, NY, USA, 2003. ACM.

10
Monika Vetterling, Guido Wimmel, and Alexander Wisspeintner.
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations.
Lecture Notes in Computer Science, pages 574-588, Thursday, November 23 2006.

11
Guido Oliver Wimmel.
Model-Based Development of Security-Critical Systems.
PhD thesis, Technische Universität München, June 2005.

12
Margaret McGaley and Joe McCarthy.
Transparency and e-Voting: Democratic vs. Commercial Interests.
In Alexander Prosser and Robert Krimmer, editor, Electronic Voting in Europe, volume 47 of LNI, pages 153-163. GI, 2004.

13
Letizia Caporusso and Carlo Buzzi and Giolo Fele and Pierangelo Peri and Francesca Sartori.
Transition to Electronic Voting and Citizen Participation.
In Robert Krimmer, editor, Electronic Voting, volume 86, pages 191-200. GI, 2006.

14
Anne-Marie Oostveen and Peter Van den Besselaar.
Security as Belief User's Perceptions on the Security of E-Voting Systems.
In Prosser and Krimmer [28], pages 73-82.

15
Komminist Weldemariam, Adolfo Villafiorita, and Andrea Mattioli.
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach.
In Ammar Alkassar and Melanie Volkamer, editors, VOTE-ID, volume 4896 of Lecture Notes in Computer Science, pages 38-49. Springer, 2007.

16
Andrea Mattioli.
Analysis of Processes in the Context of Electronic Election.
Master's thesis, University of Trento, Italy, 2005-2006.
In Italian.

17
Aaron Ciaghi.
From Laws to Models: Tools and Methodologies.
Master's thesis, University of Trento, Italy, 2006-2007.
In Italian.

18
P. Bertoli, A. Cimatti, M. Pistore, M. Roveri, and P. Traverso.
NuSMV 2: An Open Source Tool for Symbolic Model Checking.
In Proc. of International Conference on Computer-Aided Verification, 2002.

19
Marco Bozzano and Adolfo Villafiorita.
The FSAP/NuSMV-SA Safety Analysis Platform.
Int. J. Softw. Tools Technol. Transf., 9(1):5-24, 2007.

20
Alexandros Xenakis and Ann Macintosh.
Procedural Security Analysis of Electronic Voting.
In ICEC '04: Proceedings of the 6th international conference on Electronic commerce, pages 541-546, New York, NY, USA, 2004. ACM Press.

21
Alexandros Xenakis and Ann Macintosh.
Procedural Security and Social Acceptance in E-Voting.
In HICSS '05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 5, page 118.1, Washington, DC, USA, 2005. IEEE Computer Society.

22
Alexandros Xenakis and Ann Macintosh.
Using Business Process Re-engineering (BPR) for the Effective Administration of Electronic Voting.
The Electronic Journal of e-Government, 3(2), 2005.

23
Alexandros Xenakis and Ann Macintosh.
A Generic Re-engineering Methodology for the Organized Redesign of the Electoral Process to an E-electoral Process.
In Robert Krimmer, editor, Electronic Voting, volume 86 of LNI, pages 119-130. GI, 2006.

24
Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vasilis Tsoumas, Dimitris Gritzalis, and Sokratis Katsikas.
Electronic Voting Systems: Security Implications of the Administrative Workflow.
In DEXA '03: Proceedings of the 14th International Workshop on Database and Expert Systems Applications, page 467, Washington, DC, USA, 2003. IEEE Computer Society.

25
Volha Bryl, Fabiano Dalpiaz, Roberta Ferrario, Andrea Mattioli and Adolfo Villafiorita.
Evaluating Procedural Alternatives. A Case Study in e-Voting.
Proceedings of METTEG07, 2007.
An extended version has been published as a Technical Report DIT-07-005, Informatica e Telecomunicazioni, University of Trento.

26
Thomas Eiter and Georg Gottlob and Heikki Mannila.
Disjunctive Datalog.
ACM Trans. Database Syst., 22(3):364-418, 1997.

27
The Common Criteria (Volume 3.1), September 2006.
http://www.commoncriteriaportal.org/.

28
Alexander Prosser and Robert Krimmer, editors.
Electronic Voting in Europe - Technology, Law, Politics and Society, Workshop of the ESF TED Programme together with GI and OCG, July, 7th-9th, 2004, in Schloß Hofen / Bregenz, Lake of Constance, Austria, Proceedings, volume 47 of LNI. GI, 2004.



komminist 2008-06-30