메뉴 건너뛰기




Volumn 12, Issue 1, 2002, Pages 61-78

On the security of open source software

Author keywords

Code review; Computer security; Open source software; Proprietary software; Security vulnerabilities

Indexed keywords

OPEN SOURCE SOFTWARE;

EID: 0036116939     PISSN: 13501917     EISSN: None     Source Type: Journal    
DOI: 10.1046/j.1365-2575.2002.00118.x     Document Type: Article
Times cited : (80)

References (29)
  • 4
    • 0038473872 scopus 로고    scopus 로고
    • Version 1.00
    • Friedrichs, O. (2000) Secure programming. http://www.securityfocus.com/forums/secprog/secure-programming.html. Version 1.00.
    • (2000) Secure Programming
    • Friedrichs, O.1
  • 9
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Levy, E. (1996) Smashing the stack for fun and profit. Phrack 49.
    • (1996) Phrack , vol.49
    • Levy, E.1
  • 10
  • 14
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman, B. C. & Ts'o, T. (1994) Kerberos: An authentication service for computer networks. IEEE Communications 32(9): 33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 18
    • 23044524265 scopus 로고    scopus 로고
    • The role of the development process In operating system security
    • Information Security: Third International Workshop, ISW 2000. Pieprzyk, J., Okamoto, E. & Seberry, J. (eds), Springer, Germany
    • Payne, C. (2000) The role of the development process In operating system security. In: Information Security: Third International Workshop, ISW 2000, Vol. 1975 of Lecture Notes in Computer Science. Pieprzyk, J., Okamoto, E. & Seberry, J. (eds), pp. 277-291 Springer, Germany.
    • (2000) Lecture Notes in Computer Science , vol.1975 , pp. 277-291
    • Payne, C.1
  • 19
    • 0004198635 scopus 로고    scopus 로고
    • Prentice-Hall, Upper Saddle River, New Jersey
    • Pfleeger, C. (1997) Security in Computing. Prentice-Hall, Upper Saddle River, New Jersey.
    • (1997) Security in Computing
    • Pfleeger, C.1
  • 23
    • 0038811652 scopus 로고    scopus 로고
    • Full disclosure and the window of exposure
    • Schneier, B. (2000b) Full disclosure and the window of exposure. Crypto-Gram. http://www.counterpare.com/ crypto-gram-0009.html#1.
    • (2000) Crypto-Gram
    • Schneier, B.1
  • 24
    • 0038811632 scopus 로고    scopus 로고
    • POP DH vs RSA FAQ
    • Simpson, S. (1999) POP DH vs RSA FAQ. http://www.scramdisk.clara.net/pgpfaq.html.
    • (1999)
    • Simpson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.