메뉴 건너뛰기




Volumn 57, Issue 1, 2008, Pages 14-22

Application of vulnerability discovery models to major operating systems

Author keywords

Operating systems; Security; Software reliability growth models; Vulnerabilities; Vulnerability discovery

Indexed keywords

COMPUTER SIMULATION; SECURITY OF DATA; SOFTWARE ENGINEERING; SOFTWARE RELIABILITY;

EID: 41449117969     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2008.916872     Document Type: Article
Times cited : (92)

References (24)
  • 1
    • 41449114725 scopus 로고
    • Prediction and Entropy NTIS, Springfield, VA
    • MRC Technical Summary Report #2397
    • H. Akaike, Prediction and Entropy NTIS, Springfield, VA, MRC Technical Summary Report #2397, 1982.
    • (1982)
    • Akaike, H.1
  • 3
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • May
    • O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems," Computers and Security Journal, vol. 26, no. 3, pp. 219-228, May 2007.
    • (2007) Computers and Security Journal , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 8
    • 26444448266 scopus 로고    scopus 로고
    • Security in open versus closed systems - The dance of Boltzmann, Coase and Moore
    • Toulouse, France:, June 20-21
    • R. J. Anderson, "Security in open versus closed systems - The dance of Boltzmann, Coase and Moore," in Open Source Software: Economics, Law and Policy. Toulouse, France:, June 20-21, 2002.
    • (2002) Open Source Software: Economics, Law and Policy
    • Anderson, R.J.1
  • 9
    • 78249276668 scopus 로고    scopus 로고
    • Timing the application of security patches for optimal uptime
    • November
    • S. Beattie, S. Arnold, C. Cowan, P. Wagle, and C. Wright, "Timing the application of security patches for optimal uptime," in Proc. LISA XVI, November 2002, pp. 233-242.
    • (2002) Proc. LISA XVI , pp. 233-242
    • Beattie, S.1    Arnold, S.2    Cowan, C.3    Wagle, P.4    Wright, C.5
  • 10
    • 0030410990 scopus 로고    scopus 로고
    • A conservative theory for longterm reliability growth prediction
    • Dec
    • P. G. Bishop and R. E. Bloomfield, "A conservative theory for longterm reliability growth prediction," IEEE Trans. Reliability, vol. 45, no. 4, pp. 550-560, Dec. 1996.
    • (1996) IEEE Trans. Reliability , vol.45 , Issue.4 , pp. 550-560
    • Bishop, P.G.1    Bloomfield, R.E.2
  • 11
    • 12344266250 scopus 로고    scopus 로고
    • Murphy's law, the fitness of evolving species, and the limits of software reliability Cambridge University Computer Laboratory
    • Technical Report No. 471, September, Online, Available
    • R. M. Brady, R. J. Anderson, and R. C. Ball, Murphy's law, the fitness of evolving species, and the limits of software reliability Cambridge University Computer Laboratory, Technical Report No. 471, September 1999 [Online]. Available: http://www.cl.cam.ac.uk/ftp/users/rja14/babtr.pdf
    • (1999)
    • Brady, R.M.1    Anderson, R.J.2    Ball, R.C.3
  • 13
    • 0037244529 scopus 로고    scopus 로고
    • B. Brykczynski and R. A. Small, Reducing internet-based intrusion Effective security patch management, IEEE Software, 20, no. pp. 50-57, Jan./Feb. 2003.
    • B. Brykczynski and R. A. Small, "Reducing internet-based intrusion Effective security patch management," IEEE Software, vol. 20, no. pp. 50-57, Jan./Feb. 2003.
  • 14
    • 0018505572 scopus 로고
    • Time-dependent error detection rat model for software and other performance measures
    • August
    • A. L. Goel and K. Okumoto, "Time-dependent error detection rat model for software and other performance measures," IEEE Trans. on Reliability, vol. R-28, no. 3, pp. 206-211, August 1979.
    • (1979) IEEE Trans. on Reliability , vol.R-28 , Issue.3 , pp. 206-211
    • Goel, A.L.1    Okumoto, K.2
  • 15
    • 41449097529 scopus 로고    scopus 로고
    • Online, Available
    • NVD Metabase July 2006 [Online]. Available: http://nvd.nist.gov
    • (2006)
  • 16
    • 41449088477 scopus 로고    scopus 로고
    • Handbook of Software Reliability Engineering, M. R. Lyu, Ed., McGraw-Hill, 1995.
    • "Handbook of Software Reliability Engineering," M. R. Lyu, Ed., McGraw-Hill, 1995.
  • 18
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • March/April
    • G. McGraw, "From the ground up: The DIMACS software security workshop," IEEE Security & Privacy, vol. 1, no. 2, pp. 59-66, March/April 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 19
    • 41449090334 scopus 로고    scopus 로고
    • The MITRE Corporation, February, Online, Available
    • The MITRE Corporation, February 2005 [Online]. Available: www.mitre.org
    • (2005)
  • 21
    • 0021208648 scopus 로고
    • A logarithmic Poisson execution time model for software reliability measurement
    • Orlando, FL
    • J. D. Musa and K. Okumoto, "A logarithmic Poisson execution time model for software reliability measurement," in Proc. 7th International Conference on Software Engineering, Orlando, FL, 1984, pp. 230-238.
    • (1984) Proc. 7th International Conference on Software Engineering , pp. 230-238
    • Musa, J.D.1    Okumoto, K.2
  • 22
    • 84877999984 scopus 로고    scopus 로고
    • Milk or wine: Does software security improve with age?
    • Vancouver, BC, July 31-August 4
    • A. Ozment and S. E. Schechter, "Milk or wine: Does software security improve with age?," in The 15th USENIX Security Symposium, Vancouver, BC, July 31-August 4 2006.
    • (2006) The 15th USENIX Security Symposium
    • Ozment, A.1    Schechter, S.E.2
  • 23
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • Jan./Feb
    • E. Rescola, "Is finding security holes a good idea?," Security and Privacy, pp. 14-19, Jan./Feb. 2005.
    • (2005) Security and Privacy , pp. 14-19
    • Rescola, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.