{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:10:34Z","timestamp":1725563434168},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642151576"},{"type":"electronic","value":"9783642151583"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15158-3_19","type":"book-chapter","created":{"date-parts":[[2010,8,20]],"date-time":"2010-08-20T07:45:51Z","timestamp":1282290351000},"page":"225-236","source":"Crossref","is-referenced-by-count":2,"title":["An Integrated Application of Security Testing Methodologies to e-voting Systems"],"prefix":"10.1007","author":[{"given":"Marco","family":"Ramilli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Prandini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B. Arkin","year":"2005","unstructured":"Arkin, B., Stender, S., McGraw, G.: Software penetration testing. Security & Privacy, IEEE\u00a03(1), 84\u201387 (2005)","journal-title":"Security & Privacy, IEEE"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2008.115","volume":"6","author":"E. Bonver","year":"2008","unstructured":"Bonver, E., Cohen, M.: Developing and retaining a security testing mindset. Security & Privacy, IEEE\u00a06(5), 82\u201385 (2008)","journal-title":"Security & Privacy, IEEE"},{"issue":"5","key":"19_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2004.84","volume":"2","author":"B. Potter","year":"2004","unstructured":"Potter, B., McGraw, G.: Software security testing. Security & Privacy, IEEE\u00a02(5), 81\u201385 (2004)","journal-title":"Security & Privacy, IEEE"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSECP.2003.1219078","volume":"1","author":"H. Thompson","year":"2003","unstructured":"Thompson, H.: Why security testing is hard. Security & Privacy, IEEE\u00a01(4), 83\u201386 (2003)","journal-title":"Security & Privacy, IEEE"},{"key":"19_CR5","unstructured":"Brown, T., Anderson, W., et al.: Open vulnerability assessment system (December 2009)"},{"key":"19_CR6","unstructured":"Moser, M., Aharoni, M., Muench, M.J., et al.: Backtrack (June 2009)"},{"key":"19_CR7","unstructured":"Horlick, J.: HB 150-20 Information Technology Security Testing: Common Criteria. National Institute of Standards and Technology (October 2005)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Cody, A., Souppaya, M., Orebaugh, A.: SP 800-115 Technical Guide to Information Security Testing and Assessment. National Institute of Standards and Technology (September 2008)","DOI":"10.6028\/NIST.SP.800-115"},{"key":"19_CR9","unstructured":"Technical Guidelines Development Committee (ed.): 5.4. In: Voluntary Voting System Guidelines Recommendations to the Election Assistance Commission. U.S. Election Assistance Commission (August 2007)"},{"key":"19_CR10","unstructured":"U.S. Election Assistance Commission (ed.): Voluntary Voting System Guidelines. U.S. Election Assistance Commission (2005)"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2008.70","volume":"6","author":"D. Chaum","year":"2008","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A., Vora, P.: Scantegrity: End-to-end voter-verifiable optical- scan voting. Security Privacy, IEEE\u00a06(3), 40\u201346 (2008)","journal-title":"Security Privacy, IEEE"},{"key":"19_CR12","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: SS\u201908: Proceedings of the 17th conference on Security symposium, pp. 335\u2013348. USENIX Association, Berkeley (2008)"},{"key":"19_CR13","unstructured":"Feldman, A.J., Halderman, J.A., Felten, E.W.: Security analysis of the diebold accuvote-ts voting machine. In: EVT\u201907: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, p. 2. USENIX Association, Berkeley (2007)"},{"issue":"11","key":"19_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/1297797.1297827","volume":"50","author":"M. Bishop","year":"2007","unstructured":"Bishop, M., Wagner, D.: Risks of e-voting. ACM Commun.\u00a050(11), 120\u2013120 (2007)","journal-title":"ACM Commun."},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/1390630.1390660","volume-title":"ISSTA \u201908: Proceedings of the 2008 international symposium on Software testing and analysis","author":"D. Balzarotti","year":"2008","unstructured":"Balzarotti, D., Banks, G., Cova, M., Felmetsger, V., Kemmerer, R., Robertson, W., Valeur, F., Vigna, G.: Are your votes really counted?: testing the security of real-world electronic voting systems. In: ISSTA \u201908: Proceedings of the 2008 international symposium on Software testing and analysis, pp. 237\u2013248. ACM, New York (2008)"},{"key":"19_CR16","unstructured":"Wagner, D.: Report of the california voting system review (USENIX Security Symposium (2007), http:\/\/www.usenix.org\/events\/sec07\/tech\/"},{"key":"19_CR17","unstructured":"Ohio secretary of state (pub): Evaluation & validation of election-related equipment, standards & testing - \/SOS\/elections\/voterInformation\/equipment\/VotingSystemReviewFindings.aspx, http:\/\/www.sos.state.oh.us"},{"key":"19_CR18","unstructured":"Open Information Systems Security Group: Information systems security assessment framework (2006)"},{"key":"19_CR19","unstructured":"Institute for Security and Open Methodologies: Open source security testing methodology manual (2009)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Wack, J., Tracy, M., Souppaya, M.: SP 800-42 Guideline on Network Security Testing. National Institute of Standards and Technology (October 2003)","DOI":"10.6028\/NIST.SP.800-42"}],"container-title":["Lecture Notes in Computer Science","Electronic Participation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15158-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:06:40Z","timestamp":1559434000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15158-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642151576","9783642151583"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15158-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}