-
1
-
-
26444448266
-
Security in open versus closed systems-The dance of Boltzmann, Coase and Moore
-
Toulouse, France, June 20-21
-
Anderson, R. Security in open versus closed systems-The dance of Boltzmann, Coase and Moore. In Proceeding; of the Conference on Open Source Software Economics (Toulouse, France, June 20-21 2002).
-
(2002)
Proceeding; of the Conference on Open Source Software Economics
-
-
Anderson, R.1
-
2
-
-
3042791619
-
Opening the open source debate. Technical report, Alexis de Tocqueville Institution
-
June
-
Brown, K. Opening the open source debate. Technical report, Alexis de Tocqueville Institution, June 2002.
-
(2002)
-
-
Brown, K.1
-
3
-
-
2342591623
-
Software security for open-source systems
-
Cowan, C. Software security for open-source systems. IEEE J. Security &-Privacy 1, 1 (2003), 38-45.
-
(2003)
IEEE J. Security &-Privacy
, vol.1
, Issue.1
, pp. 38-45
-
-
Cowan, C.1
-
4
-
-
4243120803
-
A look at the economics of open source
-
Feb
-
Glass, R.L. A look at the economics of open source. Comm, ACM 47, 2 (Feb. 2004), 25-27.
-
(2004)
Comm, ACM
, vol.47
, Issue.2
, pp. 25-27
-
-
Glass, R.L.1
-
5
-
-
33845947879
-
-
Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires, IX (1983), 5-38 (Also Jan. 1883, 161-191 and Feb. 1883).
-
Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires, IX (1983), 5-38 (Also Jan. 1883, 161-191 and Feb. 1883).
-
-
-
-
6
-
-
3543102147
-
Analysis of an electronic voting system
-
Oakland, CA, May 9-12
-
Kohno, T., Stubblefield, A., Rubin, AD., and Wallach, D.S. Analysis of an electronic voting system. In Proceeding of the IEEE Conference on Security & Privacy, (Oakland, CA, May 9-12 2004).
-
(2004)
Proceeding of the IEEE Conference on Security & Privacy
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
7
-
-
19744362318
-
Inside Risks: Security by obscurity
-
Dec
-
Mercuri, R.T., and Neumann, P.G. Inside Risks: Security by obscurity. Comm. ACM 46, 11 (Dec. 2003), 160.
-
(2003)
Comm. ACM
, vol.46
, Issue.11
, pp. 160
-
-
Mercuri, R.T.1
Neumann, P.G.2
-
8
-
-
4243059437
-
Inside Risks: Information system security redux
-
Oct
-
Neumann, P.G. Inside Risks: Information system security redux. Comm. ACM 46, 10 (Oct. 2003), 136.
-
(2003)
Comm. ACM
, vol.46
, Issue.10
, pp. 136
-
-
Neumann, P.G.1
-
11
-
-
84976781807
-
Reflections on trusting trust
-
Aug
-
Thompson, K. Reflections on trusting trust. Comm. ACM 27, 8 (Aug. 1984), 761-763.
-
(1984)
Comm. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
12
-
-
0035446933
-
Does open source improve system security?
-
Sept.-Oct
-
Witten, B., Landwehr, C., and Caloyannides, M. Does open source improve system security? IEEE Software, (Sept.-Oct. 2001), 57-61.
-
(2001)
IEEE Software
, pp. 57-61
-
-
Witten, B.1
Landwehr, C.2
Caloyannides, M.3
|