On the security of open source software
@article{Payne2002OnTS, title={On the security of open source software}, author={C. Payne}, journal={Information Systems Journal}, year={2002}, volume={12} }
Abstract With the rising popularity of so‐called ‘open source’ software there has been increasing interest in both its various benefits and disadvantages. In particular, despite its prominent use in providing many aspects of the Internet's basic infrastructure, many still question the suitability of such software for the commerce‐oriented Internet of the future. This paper evaluates the suitability of open source software with respect to one of the key attributes that tomorrow's Internet will… CONTINUE READING
Topics from this paper
104 Citations
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Question
- Computer Science
- 2010 43rd Hawaii International Conference on System Sciences
- 2010
- 8
- PDF
Security vulnerabilities in open source projects: An India perspective
- Business
- 2014 2nd International Conference on Information and Communication Technology (ICoICT)
- 2014
- 4
- PDF
To prevent them from entering, provide the keys
- Computer Science, Engineering
- Int. J. Inf. Technol. Manag.
- 2009
Modelling the Economics of Free and Open Source Software Security
- Computer Science
- ISSE
- 2006
- 2
- Highly Influenced
Industry-Wide Analysis of Open Source Security
- Business, Computer Science
- 2018 16th Annual Conference on Privacy, Security and Trust (PST)
- 2018
- 1
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors
- Computer Science
- 2009 Fifth International Conference on IT Security Incident Management and IT Forensics
- 2009
- 26
- PDF
Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities
- Computer Science
- AMCIS
- 2009
- 32
- PDF
Commercial software companies and open source community reaction to disclosed vulnerabilities: Case of Windows Server 2008 and Linux patching
- Computer Science
- 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)
- 2017
- 1
The Application of DEA to Measure the Efficiency of Open Source Security Tool Production
- Computer Science
- AMCIS
- 2007
- 1
References
SHOWING 1-10 OF 32 REFERENCES
INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD
- Engineering
- 1991
- 378
- PDF
Kerberos: an authentication service for computer networks
- Computer Science
- IEEE Communications Magazine
- 1994
- 1,466