메뉴 건너뛰기




Volumn 33, Issue 3, 2007, Pages 171-185

Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge

Author keywords

Disclosure mechanisms; Economic modeling; Game theory; Information security; Responsible vulnerability disclosure; Software vulnerabilities

Indexed keywords

DATA PRIVACY; ECONOMIC AND SOCIAL EFFECTS; GAME THEORY; INFORMATION DISSEMINATION; KNOWLEDGE MANAGEMENT;

EID: 33947376004     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2007.26     Document Type: Article
Times cited : (81)

References (36)
  • 1
    • 33947371373 scopus 로고    scopus 로고
    • "ASPR Notification and Publishing Policy"
    • Across
    • "ASPR Notification and Publishing Policy," Across, www.acrossecurity.com/asprNotificationAndPublishingPolicy.htm, 2004.
    • (2004)
  • 2
    • 0034501876 scopus 로고    scopus 로고
    • "Windows of Vulnerability: A Case Study Analysis"
    • Dec
    • W.A. Arbaugh, W.L. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, pp. 52-59, Dec. 2002.
    • (2002) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 4
    • 33750703619 scopus 로고    scopus 로고
    • "Network Software Security and User Incentives"
    • T. August and T.I. Tunca, "Network Software Security and User Incentives," Management Science, vol. 52, no. 11, pp. 1703-1720, 2006.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 5
    • 33947365263 scopus 로고    scopus 로고
    • "Organization for Internet Safety Issues a Public Comment Draft for Security Vulnerability Reporting and Response Guide"
    • BindView
    • "Organization for Internet Safety Issues a Public Comment Draft for Security Vulnerability Reporting and Response Guide," BindView, http://www.bindview.com/News/display.cfm?Release=2003/0604b.txt/, 2003.
    • (2003)
  • 7
    • 33947373662 scopus 로고    scopus 로고
    • "Economics of IT Security Management: Four Improvements to Current Security Practices"
    • article 3, July
    • H. Cavusoglu, H. Cavusoglu, and S. Raghunathan, "Economics of IT Security Management: Four Improvements to Current Security Practices," Comm. AIS, vol. 14, article 3, July 2004.
    • (2004) Comm. AIS , vol.14
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 9
    • 33947418606 scopus 로고    scopus 로고
    • "Locking Windows"
    • CBS News.com 16 Jan
    • "Locking Windows," CBS News.com, 16 Jan. 2002.
    • (2002)
  • 10
    • 33947387629 scopus 로고    scopus 로고
    • "Vulnerability Disclosure Policy"
    • CERT Coordination Center
    • "Vulnerability Disclosure Policy,"CERT Coordination Center, 2000.
    • (2000)
  • 11
    • 33749162402 scopus 로고    scopus 로고
    • "Vulnerability Disclosure Framework: Final Report and Recommendations by the Council"
    • US Nat'l Infrastructure Advisory Council, 13 Jan
    • J.C. Chambers and J.W. Thompson, "Vulnerability Disclosure Framework: Final Report and Recommendations by the Council," US Nat'l Infrastructure Advisory Council, 13 Jan. 2004.
    • (2004)
    • Chambers, J.C.1    Thompson, J.W.2
  • 12
    • 33947387628 scopus 로고    scopus 로고
    • "Definition of a Security Vulnerability"
    • MicrosoftTech-Net
    • S. Culp, "Definition of a Security Vulnerability," MicrosoftTech-Net, 2000.
    • (2000)
    • Culp, S.1
  • 13
    • 33947366573 scopus 로고    scopus 로고
    • "CYBSEC Security Vulnerability Disclosure Policy"
    • "CYBSEC Security Vulnerability Disclosure Policy," http:// www.cybsec.com/vulnerability_policy.pdf, 2004.
    • (2004)
  • 14
    • 33947394528 scopus 로고    scopus 로고
    • "Upcoming Advisories"
    • eEyes
    • "Upcoming Advisories," eEyes, http://www.eeye.com/html/research/upcoming/index.html, 2004.
    • (2004)
  • 15
    • 33947410477 scopus 로고    scopus 로고
    • "CERT, Feds Consider New Reporting Process"
    • eWeek, 24 Mar
    • D. Fisher, "CERT, Feds Consider New Reporting Process," eWeek, 24 Mar. 2003.
    • (2003)
    • Fisher, D.1
  • 16
    • 33947410478 scopus 로고    scopus 로고
    • "Communication in the Software Vulnerability Reporting Process"
    • MA thesis, Univ. Jyväskylä
    • T. Havana, "Communication in the Software Vulnerability Reporting Process," MA thesis, Univ. Jyväskylä, 2003.
    • (2003)
    • Havana, T.1
  • 19
    • 12344276061 scopus 로고    scopus 로고
    • "Procedures for Handling Security Patches"
    • NIST 800-40, US Nat'l Inst. Standards and Technology
    • "Procedures for Handling Security Patches," NIST 800-40, US Nat'l Inst. Standards and Technology, 2002.
    • (2002)
  • 21
    • 33847063460 scopus 로고    scopus 로고
    • "Guidelines for Security Vulnerability Reporting and Response"
    • version 2.0, Organization for Internet Safety, 1 Sept
    • "Guidelines for Security Vulnerability Reporting and Response," version 2.0, Organization for Internet Safety, 1 Sept. 2004.
    • (2004)
  • 23
    • 67650336989 scopus 로고    scopus 로고
    • "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting"
    • A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting," Proc. Workshop Economics of Information Security, 2005.
    • (2005) Proc. Workshop Economics of Information Security
    • Ozment, A.1
  • 24
    • 33947369167 scopus 로고    scopus 로고
    • "Do Security Holes Demand Full Disclosure?"
    • ZDNet, 15 Aug
    • W. Pond, "Do Security Holes Demand Full Disclosure?" ZDNet, 15 Aug. 2000.
    • (2000)
    • Pond, W.1
  • 25
    • 14744268697 scopus 로고    scopus 로고
    • "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment"
    • E. Preston and J. Lofton, "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment," Whittier Law Rev., vol. 24, pp. 71-142, 2002.
    • (2002) Whittier Law Rev. , vol.24 , pp. 71-142
    • Preston, E.1    Lofton, J.2
  • 26
    • 33947375290 scopus 로고    scopus 로고
    • "Vulnerability Disclosure - Let's Be Honest about Motives Shall We?"
    • M.J. Ranum, "Vulnerability Disclosure - Let's Be Honest about Motives Shall We?" http://www.ranum.com/security/computer_security/index.html 2004.
    • (2004)
    • Ranum, M.J.1
  • 28
    • 33947357884 scopus 로고    scopus 로고
    • special issue vulnerability disclosure
    • Secure Business Quarterly, special issue vulnerability disclosure, vol. 2, 2002.
    • (2002) Secure Business Quarterly , vol.2
  • 29
    • 20944436854 scopus 로고    scopus 로고
    • "How to Buy Better Testing: Using Competition to Get the Most Security and Robustness for Your Dollar"
    • S. Schechter, "How to Buy Better Testing: Using Competition to Get the Most Security and Robustness for Your Dollar," Proc. Infrastructure Security Conf., 2002.
    • (2002) Proc. Infrastructure Security Conf.
    • Schechter, S.1
  • 30
    • 33947379302 scopus 로고    scopus 로고
    • "Responsible Vulnerability Disclosure: A Hard Problem"
    • J. Schiller, "Responsible Vulnerability Disclosure: A Hard Problem," Secure Business Quarterly, vol. 2, no. 1-5, 2002.
    • (2002) Secure Business Quarterly , vol.2 , Issue.1-5
    • Schiller, J.1
  • 31
    • 33947412832 scopus 로고    scopus 로고
    • "Bug Secrecy vs. Full Disclosure"
    • ZDNet TechUpdate, 14 Nov
    • B. Schneier, "Bug Secrecy vs. Full Disclosure," ZDNet TechUpdate, 14 Nov. 2001.
    • (2001)
    • Schneier, B.1
  • 32
    • 33947406933 scopus 로고    scopus 로고
    • "Vulnerability Disclosure: How Do We Define Responsible Disclosure?"
    • GIAC SEC Practical Repository, SANS Inst
    • S. Shepherd, "Vulnerability Disclosure: How Do We Define Responsible Disclosure?" GIAC SEC Practical Repository, SANS Inst., 2003
    • (2003)
    • Shepherd, S.1
  • 33
    • 85008058350 scopus 로고    scopus 로고
    • "Software Flaws: To Tell or not to Tell?"
    • A. Stone, "Software Flaws: To Tell or not to Tell?" Computer, vol. 20, no. 1, pp. 70-73, 2003.
    • (2003) Computer , vol.20 , Issue.1 , pp. 70-73
    • Stone, A.1
  • 35
    • 0344792106 scopus 로고    scopus 로고
    • "Managing Online Security Risks"
    • 1 June
    • H.R. Varian, "Managing Online Security Risks," New York Times, 1 June 2000.
    • (2000) New York Times
    • Varian, H.R.1
  • 36
    • 33947430676 scopus 로고    scopus 로고
    • "Bug Disclosure, Fix Process Improving"
    • Computerworld, 10 Mar
    • J. Vijayam, "Bug Disclosure, Fix Process Improving," Computerworld, 10 Mar. 2003.
    • (2003)
    • Vijayam, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.