Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Full disclosure (computer security)

Known as: Full disclosure, Full disclosure movement 
In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour, these… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We study an optimal disclosure policy of a regulator that has information about banks (e.g., from conducting stress tests). In… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
ABSTRACT The technology to recover natural gas depends on undisclosed types and amounts of toxic chemicals. A list of 944… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
I confess, I am big fan of Dr. Thomas Joiner. In full disclosure, I consider him a friend. We correspond, we talk and we… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities represent a serious threat to cybersecurity, most cyberattacks exploit known vulnerabilities… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
One difficulty in monitoring the quality of family—professional partnerships has been the lack of a psychometrically acceptable… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of… Expand
  • table 1
  • table 3
  • table 2
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In addition to all the usual ethical problems that can arise with any kind of inquiry, network analyses, by their very nature… Expand
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Large repositories of data contain sensitive information which must be protected against unauthorized access. Recent advances, in… Expand
  • table 1
  • table 3
  • table 2
  • table 4
  • figure 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper investigates the relationship between corporate social responsibility (CSR) and the economic performance of… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • table III
Is this relevant?