메뉴 건너뛰기




Volumn 50, Issue 1, 2007, Pages 79-83

Increased security through open source

Author keywords

[No Author keywords available]

Indexed keywords

OPEN SOURCE SOFTWARE (OSS); SOFTWARE SYSTEMS; VULNERABILITY BUGS;

EID: 33845933082     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1188913.1188921     Document Type: Article
Times cited : (94)

References (12)
  • 1
    • 26444448266 scopus 로고    scopus 로고
    • Security in open versus closed systems-The dance of Boltzmann, Coase and Moore
    • Toulouse, France, June 20-21
    • Anderson, R. Security in open versus closed systems-The dance of Boltzmann, Coase and Moore. In Proceeding; of the Conference on Open Source Software Economics (Toulouse, France, June 20-21 2002).
    • (2002) Proceeding; of the Conference on Open Source Software Economics
    • Anderson, R.1
  • 2
    • 3042791619 scopus 로고    scopus 로고
    • Opening the open source debate. Technical report, Alexis de Tocqueville Institution
    • June
    • Brown, K. Opening the open source debate. Technical report, Alexis de Tocqueville Institution, June 2002.
    • (2002)
    • Brown, K.1
  • 3
    • 2342591623 scopus 로고    scopus 로고
    • Software security for open-source systems
    • Cowan, C. Software security for open-source systems. IEEE J. Security &-Privacy 1, 1 (2003), 38-45.
    • (2003) IEEE J. Security &-Privacy , vol.1 , Issue.1 , pp. 38-45
    • Cowan, C.1
  • 4
    • 4243120803 scopus 로고    scopus 로고
    • A look at the economics of open source
    • Feb
    • Glass, R.L. A look at the economics of open source. Comm, ACM 47, 2 (Feb. 2004), 25-27.
    • (2004) Comm, ACM , vol.47 , Issue.2 , pp. 25-27
    • Glass, R.L.1
  • 5
    • 33845947879 scopus 로고    scopus 로고
    • Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires, IX (1983), 5-38 (Also Jan. 1883, 161-191 and Feb. 1883).
    • Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires, IX (1983), 5-38 (Also Jan. 1883, 161-191 and Feb. 1883).
  • 7
    • 19744362318 scopus 로고    scopus 로고
    • Inside Risks: Security by obscurity
    • Dec
    • Mercuri, R.T., and Neumann, P.G. Inside Risks: Security by obscurity. Comm. ACM 46, 11 (Dec. 2003), 160.
    • (2003) Comm. ACM , vol.46 , Issue.11 , pp. 160
    • Mercuri, R.T.1    Neumann, P.G.2
  • 8
    • 4243059437 scopus 로고    scopus 로고
    • Inside Risks: Information system security redux
    • Oct
    • Neumann, P.G. Inside Risks: Information system security redux. Comm. ACM 46, 10 (Oct. 2003), 136.
    • (2003) Comm. ACM , vol.46 , Issue.10 , pp. 136
    • Neumann, P.G.1
  • 11
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • Aug
    • Thompson, K. Reflections on trusting trust. Comm. ACM 27, 8 (Aug. 1984), 761-763.
    • (1984) Comm. ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 12
    • 0035446933 scopus 로고    scopus 로고
    • Does open source improve system security?
    • Sept.-Oct
    • Witten, B., Landwehr, C., and Caloyannides, M. Does open source improve system security? IEEE Software, (Sept.-Oct. 2001), 57-61.
    • (2001) IEEE Software , pp. 57-61
    • Witten, B.1    Landwehr, C.2    Caloyannides, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.