Open-source versus proprietary software: Is one more reliable and secure than the other?

@article{Boulanger2005OpensourceVP,
  title={Open-source versus proprietary software: Is one more reliable and secure than the other?},
  author={Alan Boulanger},
  journal={IBM Syst. J.},
  year={2005},
  volume={44},
  pages={239-248}
}
One of the most powerful movements in the information technology community today is the widespread adoption of free and open-source software (FOSS). What was once an idealistic fringe movement conceived and formalized by MacArthur award laureate Richard Stallman has now become one of the most powerful influences in the world of information technology. As FOSS systems grow in popularity, questions of the reliability and security of these systems emerge, especially in comparison with proprietary… 

To prevent them from entering, provide the keys

This paper states the arguments given by both Closed Source Software (CSS) editors and free software holders and proposes a strategy of security based on the heterogeneity of the computers owned by a company.

The success of open source software: A review

  • D. MarganS. Čandrlić
  • Computer Science
    2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
  • 2015
An overview of the state-of-the-art OSS-related research from different fields and disciplines of the social and information sciences and some real-life business examples of companies that achieved their profit with OSS are presented.

Comparative Investigation of Vulnerabilities in Open Source and Proprietary Software: An Exploratory Study

A conceptual framework is proposed to explain the variations in vulnerabilities between the OS and proprietary products and suggests that for both proprietary and open source products, severe vulnerabilities are identified relatively late in the product’ s life and continue to emerge months after the software release.

Process Scenarios in Open Source Software Certification

The aim is to introduce a process-centered perspective for OSS that can stimulate research to further understand and mitigate the mentioned trade-offs and analyse the various processes executed by different OSS stakeholders, including the process of an independent Certification Body.

Open Source ERP In Organization: Research Agenda

This paper aims to improve the understanding of the current influence of OS ERP in organizations, to provide a new light on a previously developed topic and to challenge the conventional wisdom in the field which stipulates that there are some areas like ERP applications where OS could not be developed.

Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?

This study analyzed the top 100 open source PHP applications in GitHub using a static analysis vulnerability scanner to examine how common software vulnerabilities are and found that 27% of these projects are insecure, with a median number of 3 vulnerabilities per vulnerable project.

Comparison of Software Licensing and Development Models Using Val IT

The authors compare the advantages and disadvantages between open source software and software Proprietary using VAL IT as a framework to find the result of the Open Source Software is low cost but company should spend budget for the training and for the report the company need to learn to create the reporting.

An Application of OSSpal for the Assessment of Open Source Project Management Tools

This paper evaluates three different project management tools - OpenProject, dotProject, and Odoo - using the OSSpal methodology and concludes that OpenProject is the best choice.

End User in Charge - Social Framework for Open Source Development

A social framework for OSS development is proposed to allow: (1) knowing the degree of matching between the sought user’s requirements and the available OSS by presenting the end-user with the business domain model of a candidate OSS associated to its textual requirements description and (2) a lifetime communication between the users and OSS developers.
...

References

SHOWING 1-10 OF 20 REFERENCES

Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!

This paper provides quantitative data that, in many cases, using open source software / free software (abbreviated as OSS/FS, FLOSS, or FOSS) is a reasonable or even superior approach to using their

A Business Case Study of Open Source Software

The paper analyzes the business case of open source software, provides a history of Unix and Linux, presents the military business case, shows the applicability of Linux to the militaryBusiness case, analyzesThe use of Linux, discusses anomalies, and provides considerations for military Program Managers.

Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services

This study parallels the 1990 study and tests the reliability of a large collection of basic UNIX utility programs, X-Window applications and servers, and network services, using a simple testing method of subjecting these programs to a random input stream.

Managing the development of large software systems: concepts and techniques

I have had various assignments during the past years, mostly concerned with the development of software packages for spacecraft mission planning, commanding and post-flight analysis, and have become prejudiced by these experiences.

Cyberpunk: Outlaws and Hackers on the Computer Frontier

Using the exploits of three international hackers, Cyberpunk explores the world of high-tech computer rebels and the subculture they've created and how difficult it is to stop them.

The Skyline Drive

The Shenandoah National Park’s Skyline Drive developed out of disparate visions of planning in the region. This conflict between the regionalists and the metropolitanists shaped the development of

With microscope and tweezers: an analysis of the Internet virus of November 1988

The authors present a detailed analysis of the virus program, a program which broke into computers on the network and which spread from one machine to another, and the contents of its built-in dictionary.

An empirical study of the reliability of UNIX utilities

The following section describes the tools we built to test the utilities. These tools include the fuzz (random character) generator, ptyjig (to test interactive utilities), and scripts to automate

How Open Source and Commercial Software Compare: MySQL White Paper, Reasoning, Inc

  • How Open Source and Commercial Software Compare: MySQL White Paper, Reasoning, Inc
  • 2003

Opening the Open Source Debate: A White Paper

  • Opening the Open Source Debate: A White Paper
  • 2002