메뉴 건너뛰기




Volumn 37, Issue 7, 2004, Pages 27-34

Who is liable for insecure systems?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SOFTWARE; COMPUTER SOFTWARE MAINTENANCE; COMPUTER SYSTEMS; PRODUCT LIABILITY; REGISTRATION OF ENGINEERS; SECURITY SYSTEMS; SOFTWARE ENGINEERING;

EID: 3242785761     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2004.69     Document Type: Article
Times cited : (5)

References (20)
  • 1
    • 0034427834 scopus 로고    scopus 로고
    • The byte stops here: Duty and liability for negligent internet security
    • Fall
    • E. Kenneally, "The Byte Stops Here: Duty and Liability for Negligent Internet Security," Computer Security J., vol. 16, no. 4, Fall 2000, pp. 1-26.
    • (2000) Computer Security J. , vol.16 , Issue.4 , pp. 1-26
    • Kenneally, E.1
  • 2
    • 0347762494 scopus 로고    scopus 로고
    • Opening statement
    • Jan
    • T.C. Redman, "Opening Statement," Cutter IT J., Jan. 2003, pp. 2-5.
    • (2003) Cutter IT J. , pp. 2-5
    • Redman, T.C.1
  • 3
    • 0347762461 scopus 로고    scopus 로고
    • To clean or not to clean, That is the question
    • Jan
    • R.W. Pautke, "To Clean or Not to Clean, That Is the Question," Cutter IT J., Jan. 2003, pp. 11-12.
    • (2003) Cutter IT J. , pp. 11-12
    • Pautke, R.W.1
  • 4
    • 85008057868 scopus 로고    scopus 로고
    • Good enough is not good enough
    • Sept.-Oct
    • K. Reed, "Good Enough Is Not Good Enough," IEEE Software, Sept.-Oct. 2003, p. 109.
    • (2003) IEEE Software , pp. 109
    • Reed, K.1
  • 5
    • 0032097883 scopus 로고    scopus 로고
    • A map of security risks associated with using COTS
    • June
    • U. Lindqvist and E. Jonsson, "A Map of Security Risks Associated with Using COTS," Computer, June 1998, pp. 60-66.
    • (1998) Computer , pp. 60-66
    • Lindqvist, U.1    Jonsson, E.2
  • 7
    • 3242789458 scopus 로고    scopus 로고
    • Distributed denial of service attacks: Who pays?
    • Int'l Ed., Aug
    • M.J. Radin, "Distributed Denial of Service Attacks: Who Pays?" Computer Economics Report, Int'l Ed., Aug. 2001, pp. 12-15.
    • (2001) Computer Economics Report , pp. 12-15
    • Radin, M.J.1
  • 8
    • 3242772195 scopus 로고    scopus 로고
    • Decision support: You can't outsource liability for security
    • Aug
    • R. Weiler, "Decision Support: You Can't Outsource Liability for Security," Information Week, Aug. 2002; www.informationweek.com/story/IWK20020822S0003.
    • (2002) Information Week
    • Weiler, R.1
  • 9
    • 3042744350 scopus 로고    scopus 로고
    • Two views on security software liability: Let the legal system decide
    • Jan.-Feb
    • D.J. Ryan, "Two Views on Security Software Liability: Let the Legal System Decide," IEEE Security & Privacy, Jan.-Feb. 2003, pp. 70-72.
    • (2003) IEEE Security and Privacy , pp. 70-72
    • Ryan, D.J.1
  • 10
    • 3242785680 scopus 로고    scopus 로고
    • Who's liable for insecure networks?
    • June
    • E. Kenneally, "Who's Liable for Insecure Networks?" Computer, June 2002, pp. 93-94.
    • (2002) Computer , pp. 93-94
    • Kenneally, E.1
  • 11
    • 3042780586 scopus 로고    scopus 로고
    • Two views on security software liability: Using the right legal tools
    • Jan.-Feb
    • C. Heckman, "Two Views on Security Software Liability: Using the Right Legal Tools," IEEE Security & Privacy, Jan.-Feb. 2003, pp. 73-75.
    • (2003) IEEE Security and Privacy , pp. 73-75
    • Heckman, C.1
  • 15
    • 3242790967 scopus 로고    scopus 로고
    • Proponents drop support for controversial software proposal
    • Oct
    • L.D. Paulson, "Proponents Drop Support for Controversial Software Proposal," Computer, Oct. 2003, p. 18.
    • (2003) Computer , pp. 18
    • Paulson, L.D.1
  • 16
    • 2342589690 scopus 로고    scopus 로고
    • Inside the windows security push
    • Jan.-Feb
    • M. Howard and S. Lipner, "Inside the Windows Security Push," IEEE Security & Privacy, Jan.-Feb. 2003, pp. 57-61.
    • (2003) IEEE Security and Privacy , pp. 57-61
    • Howard, M.1    Lipner, S.2
  • 18
    • 25944480475 scopus 로고    scopus 로고
    • Suit holds microsoft responsible for worm holes
    • 3 Oct
    • J. Krim, "Suit Holds Microsoft Responsible for Worm Holes," Washington Post, 3 Oct. 2003, p. E05.
    • (2003) Washington Post
    • Krim, J.1
  • 20
    • 3042720722 scopus 로고    scopus 로고
    • Information security: Why the future belongs to the quants
    • July-Aug
    • D. Geer, K. Soo Hoo, and A. Jaquity, "Information Security: Why the Future Belongs to the Quants," IEEE Security & Privacy, July-Aug. 2003, pp. 24-32.
    • (2003) IEEE Security and Privacy , pp. 24-32
    • Geer, D.1    Soo Hoo, K.2    Jaquity, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.