Show simple item record

dc.contributor.advisorGuritman, Sugi
dc.contributor.advisorRahmawan, Hendra
dc.contributor.authorKodarsyah
dc.date.accessioned2014-03-19T02:28:25Z
dc.date.available2014-03-19T02:28:25Z
dc.date.issued2014
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/68355
dc.description.abstractConventional elections process had some weakness such as double voting and the length of time recapitulation. Furthermore that cost’s and relatively large resources. E-voting is one alternative to replace election. The main of problem in e-voting is safety factor, therefore be required a good method for identification and vulnerability analysis. Attack trees give way to simplify the task of vulnerability analysis. Purpose of this research is doing vulnerability analysis in e-voting system pilkada in bogor city. This research include the description of e-voting system pilkada in bogor city, defining secure voting requirement and vulnerability analysis to the components of the e-voting system using the method of attack trees. This analysis oriented e-voting special attack that aims to influence outcome of the election is not to sabotage election. Qualitative analysis results showed that there is a vulnerability in the e-voting system Bogor city pilkada election.en
dc.language.isoid
dc.titleVulnerability Analysis of E-Voting System Pilkada Kota Bogor using Attack Trees.en
dc.subject.keywordattack treesen
dc.subject.keywordelectionsen
dc.subject.keyworde-votingen
dc.subject.keywordvulnerabilityen


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record