-
1
-
-
33947371373
-
"ASPR Notification and Publishing Policy"
-
Across
-
"ASPR Notification and Publishing Policy," Across, www.acrossecurity.com/asprNotificationAndPublishingPolicy.htm, 2004.
-
(2004)
-
-
-
2
-
-
0034501876
-
"Windows of Vulnerability: A Case Study Analysis"
-
Dec
-
W.A. Arbaugh, W.L. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, pp. 52-59, Dec. 2002.
-
(2002)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
4
-
-
33750703619
-
"Network Software Security and User Incentives"
-
T. August and T.I. Tunca, "Network Software Security and User Incentives," Management Science, vol. 52, no. 11, pp. 1703-1720, 2006.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
5
-
-
33947365263
-
"Organization for Internet Safety Issues a Public Comment Draft for Security Vulnerability Reporting and Response Guide"
-
BindView
-
"Organization for Internet Safety Issues a Public Comment Draft for Security Vulnerability Reporting and Response Guide," BindView, http://www.bindview.com/News/display.cfm?Release=2003/0604b.txt/, 2003.
-
(2003)
-
-
-
6
-
-
0034823003
-
"A Trend Analysis of Exploitations"
-
May
-
H.K. Browne, W.A. Arbaugh, J. McHugh, and W.L. Fithen, "A Trend Analysis of Exploitations," Proc. IEEE Symp. Security and Privacy, pp. 214-229, May 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
7
-
-
33947373662
-
"Economics of IT Security Management: Four Improvements to Current Security Practices"
-
article 3, July
-
H. Cavusoglu, H. Cavusoglu, and S. Raghunathan, "Economics of IT Security Management: Four Improvements to Current Security Practices," Comm. AIS, vol. 14, article 3, July 2004.
-
(2004)
Comm. AIS
, vol.14
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
8
-
-
84901931647
-
"Security Patch Management: Can't Live with It, Can't Live without It"
-
Dec
-
H. Cavusoglu, H. Cavusoglu, and J. Zhang, "Security Patch Management: Can't Live with It, Can't Live without It," Proc. Workshop Information Technology and Systems, Dec. 2004.
-
(2004)
Proc. Workshop Information Technology and Systems
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
9
-
-
33947418606
-
"Locking Windows"
-
CBS News.com 16 Jan
-
"Locking Windows," CBS News.com, 16 Jan. 2002.
-
(2002)
-
-
-
10
-
-
33947387629
-
"Vulnerability Disclosure Policy"
-
CERT Coordination Center
-
"Vulnerability Disclosure Policy,"CERT Coordination Center, 2000.
-
(2000)
-
-
-
11
-
-
33749162402
-
"Vulnerability Disclosure Framework: Final Report and Recommendations by the Council"
-
US Nat'l Infrastructure Advisory Council, 13 Jan
-
J.C. Chambers and J.W. Thompson, "Vulnerability Disclosure Framework: Final Report and Recommendations by the Council," US Nat'l Infrastructure Advisory Council, 13 Jan. 2004.
-
(2004)
-
-
Chambers, J.C.1
Thompson, J.W.2
-
12
-
-
33947387628
-
"Definition of a Security Vulnerability"
-
MicrosoftTech-Net
-
S. Culp, "Definition of a Security Vulnerability," MicrosoftTech-Net, 2000.
-
(2000)
-
-
Culp, S.1
-
13
-
-
33947366573
-
"CYBSEC Security Vulnerability Disclosure Policy"
-
"CYBSEC Security Vulnerability Disclosure Policy," http:// www.cybsec.com/vulnerability_policy.pdf, 2004.
-
(2004)
-
-
-
14
-
-
33947394528
-
"Upcoming Advisories"
-
eEyes
-
"Upcoming Advisories," eEyes, http://www.eeye.com/html/research/upcoming/index.html, 2004.
-
(2004)
-
-
-
15
-
-
33947410477
-
"CERT, Feds Consider New Reporting Process"
-
eWeek, 24 Mar
-
D. Fisher, "CERT, Feds Consider New Reporting Process," eWeek, 24 Mar. 2003.
-
(2003)
-
-
Fisher, D.1
-
16
-
-
33947410478
-
"Communication in the Software Vulnerability Reporting Process"
-
MA thesis, Univ. Jyväskylä
-
T. Havana, "Communication in the Software Vulnerability Reporting Process," MA thesis, Univ. Jyväskylä, 2003.
-
(2003)
-
-
Havana, T.1
-
19
-
-
12344276061
-
"Procedures for Handling Security Patches"
-
NIST 800-40, US Nat'l Inst. Standards and Technology
-
"Procedures for Handling Security Patches," NIST 800-40, US Nat'l Inst. Standards and Technology, 2002.
-
(2002)
-
-
-
21
-
-
33847063460
-
"Guidelines for Security Vulnerability Reporting and Response"
-
version 2.0, Organization for Internet Safety, 1 Sept
-
"Guidelines for Security Vulnerability Reporting and Response," version 2.0, Organization for Internet Safety, 1 Sept. 2004.
-
(2004)
-
-
-
23
-
-
67650336989
-
"The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting"
-
A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting," Proc. Workshop Economics of Information Security, 2005.
-
(2005)
Proc. Workshop Economics of Information Security
-
-
Ozment, A.1
-
24
-
-
33947369167
-
"Do Security Holes Demand Full Disclosure?"
-
ZDNet, 15 Aug
-
W. Pond, "Do Security Holes Demand Full Disclosure?" ZDNet, 15 Aug. 2000.
-
(2000)
-
-
Pond, W.1
-
25
-
-
14744268697
-
"Computer Security Publications: Information Economics, Shifting Liability and the First Amendment"
-
E. Preston and J. Lofton, "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment," Whittier Law Rev., vol. 24, pp. 71-142, 2002.
-
(2002)
Whittier Law Rev.
, vol.24
, pp. 71-142
-
-
Preston, E.1
Lofton, J.2
-
26
-
-
33947375290
-
"Vulnerability Disclosure - Let's Be Honest about Motives Shall We?"
-
M.J. Ranum, "Vulnerability Disclosure - Let's Be Honest about Motives Shall We?" http://www.ranum.com/security/computer_security/index.html 2004.
-
(2004)
-
-
Ranum, M.J.1
-
28
-
-
33947357884
-
-
special issue vulnerability disclosure
-
Secure Business Quarterly, special issue vulnerability disclosure, vol. 2, 2002.
-
(2002)
Secure Business Quarterly
, vol.2
-
-
-
29
-
-
20944436854
-
"How to Buy Better Testing: Using Competition to Get the Most Security and Robustness for Your Dollar"
-
S. Schechter, "How to Buy Better Testing: Using Competition to Get the Most Security and Robustness for Your Dollar," Proc. Infrastructure Security Conf., 2002.
-
(2002)
Proc. Infrastructure Security Conf.
-
-
Schechter, S.1
-
30
-
-
33947379302
-
"Responsible Vulnerability Disclosure: A Hard Problem"
-
J. Schiller, "Responsible Vulnerability Disclosure: A Hard Problem," Secure Business Quarterly, vol. 2, no. 1-5, 2002.
-
(2002)
Secure Business Quarterly
, vol.2
, Issue.1-5
-
-
Schiller, J.1
-
31
-
-
33947412832
-
"Bug Secrecy vs. Full Disclosure"
-
ZDNet TechUpdate, 14 Nov
-
B. Schneier, "Bug Secrecy vs. Full Disclosure," ZDNet TechUpdate, 14 Nov. 2001.
-
(2001)
-
-
Schneier, B.1
-
32
-
-
33947406933
-
"Vulnerability Disclosure: How Do We Define Responsible Disclosure?"
-
GIAC SEC Practical Repository, SANS Inst
-
S. Shepherd, "Vulnerability Disclosure: How Do We Define Responsible Disclosure?" GIAC SEC Practical Repository, SANS Inst., 2003
-
(2003)
-
-
Shepherd, S.1
-
33
-
-
85008058350
-
"Software Flaws: To Tell or not to Tell?"
-
A. Stone, "Software Flaws: To Tell or not to Tell?" Computer, vol. 20, no. 1, pp. 70-73, 2003.
-
(2003)
Computer
, vol.20
, Issue.1
, pp. 70-73
-
-
Stone, A.1
-
34
-
-
33947398937
-
"Agents of Responsibility in Software Vulnerability Processes"
-
A. Takanen, P. Vuorijarvi, M. Laakso, and J. Roning, "Agents of Responsibility in Software Vulnerability Processes," Ethics and Information Technology, vol. 6, no. 2, pp. 93-110, 2004.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.2
, pp. 93-110
-
-
Takanen, A.1
Vuorijarvi, P.2
Laakso, M.3
Roning, J.4
-
35
-
-
0344792106
-
"Managing Online Security Risks"
-
1 June
-
H.R. Varian, "Managing Online Security Risks," New York Times, 1 June 2000.
-
(2000)
New York Times
-
-
Varian, H.R.1
-
36
-
-
33947430676
-
"Bug Disclosure, Fix Process Improving"
-
Computerworld, 10 Mar
-
J. Vijayam, "Bug Disclosure, Fix Process Improving," Computerworld, 10 Mar. 2003.
-
(2003)
-
-
Vijayam, J.1
|