메뉴 건너뛰기




Volumn , Issue , 2009, Pages 153-168

A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors

Author keywords

[No Author keywords available]

Indexed keywords

CLOSED SOURCE SOFTWARES; COMPARATIVE ANALYSIS; EMAIL CLIENTS; EMPIRICAL ANALYSIS; EMPIRICAL INVESTIGATION; EMPIRICAL STUDIES; NATIONAL VULNERABILITY DATABASE; OPEN SOURCES; OPERATING SYSTEMS; QUALITY OF DATA; SOFTWARE DEVELOPMENT STYLES; SOFTWARE VENDORS; THEORETICAL ARGUMENTS;

EID: 71249135127     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMF.2009.15     Document Type: Conference Paper
Times cited : (16)

References (38)
  • 2
    • 0036116939 scopus 로고    scopus 로고
    • On the security of open source software
    • C. Payne, "On the security of open source software", Information Systems Journal (12:1), 2002, pp. 61-78.
    • (2002) Information Systems Journal , vol.12 , Issue.1 , pp. 61-78
    • Payne, C.1
  • 4
    • 72949118195 scopus 로고    scopus 로고
    • E. Levy, "Wide open source", http://www.securityfocus.com/news/ 19, 2000.
    • (2000) Wide open source , pp. 19
    • Levy, E.1
  • 6
    • 34547666862 scopus 로고    scopus 로고
    • O.H. Alhazmi and Y.K. Malaiya, Measuring and enhancing prediction capabilities of vulnerability discovery models for Apache and IIS HTTP servers, in: Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE'06), Washington, DC, USA, 2006, pp. 343-352.
    • O.H. Alhazmi and Y.K. Malaiya, "Measuring and enhancing prediction capabilities of vulnerability discovery models for Apache and IIS HTTP servers", in: Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE'06), Washington, DC, USA, 2006, pp. 343-352.
  • 7
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • O. Alhazmi, Y. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems", Computers & Security (26:3), 2007, pp. 219-228.
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.1    Malaiya, Y.2    Ray, I.3
  • 9
    • 71249090651 scopus 로고    scopus 로고
    • A trend analysis of vulnerabilities
    • Technical Report 2005-05, CERIAS, Purdue University, May
    • R. Gopalakrishna and E.H. Spafford, "A trend analysis of vulnerabilities", Technical Report 2005-05, CERIAS, Purdue University, May 2005.
    • (2005)
    • Gopalakrishna, R.1    Spafford, E.H.2
  • 12
    • 36949009222 scopus 로고    scopus 로고
    • S.-W.Woo, O.H. Alhazmi Y.K. Malaiya, Assessing vulnerabilities in Apache and IIS HTTP servers, in: Proceedings of the 2nd International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA, September 29-October 01, 2006, pp. 103-110.
    • S.-W.Woo, O.H. Alhazmi Y.K. Malaiya, "Assessing vulnerabilities in Apache and IIS HTTP servers, in: Proceedings of the 2nd International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA, September 29-October 01, 2006, pp. 103-110.
  • 14
    • 84870378281 scopus 로고    scopus 로고
    • Security of open source and closed source software: An empirical comparison of published vulnerabilities
    • San Francisco, California, August 6, 9
    • G. Schryen, "Security of open source and closed source software: An empirical comparison of published vulnerabilities", in: Proceedings of Americas Conference on Information Systems, San Francisco, California, August 6 - 9, 2009.
    • (2009) Proceedings of Americas Conference on Information Systems
    • Schryen, G.1
  • 15
    • 67650336989 scopus 로고    scopus 로고
    • The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
    • Cambridge, Massachusetts, June 2-3
    • A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting", in: Proceedings of the Fourth Workshop on the Economics of Information Security, Cambridge, Massachusetts, June 2-3, 2005, pp. 1-21.
    • (2005) Proceedings of the Fourth Workshop on the Economics of Information Security , pp. 1-21
    • Ozment, A.1
  • 16
    • 71249133040 scopus 로고    scopus 로고
    • Open Source Initiative (OSI), The Open Source Definition, http://www.opensource.org/docs/osd, 2006.
    • Open Source Initiative (OSI), "The Open Source Definition", http://www.opensource.org/docs/osd, 2006.
  • 18
    • 0037840250 scopus 로고    scopus 로고
    • Free Software Foundation FSF
    • Free Software Foundation (FSF), "The Free Software Definition", http://www.fsf.org/licensing/essays/free-sw.html, 2007.
    • (2007) The Free Software Definition
  • 19
    • 71249148719 scopus 로고    scopus 로고
    • Open Source vs. Closed Source Software: Towards Measuring Security
    • Honolulu, Hawaii, March 8-12
    • G. Schryen and R. Kadura, "Open Source vs. Closed Source Software: Towards Measuring Security", in: Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, Hawaii, March 8-12, 2009, pp. 2016-2023.
    • (2009) Proceedings of the 2009 ACM Symposium on Applied Computing , pp. 2016-2023
    • Schryen, G.1    Kadura, R.2
  • 20
    • 84925838576 scopus 로고    scopus 로고
    • Why Information Security is Hard - An Economic Perspective
    • New Orleans, Louisiana, December 10-14
    • R. Anderson, "Why Information Security is Hard - An Economic Perspective", in: Proceedings of the Seventeenth Computer Security Applications Conference, New Orleans, Louisiana, December 10-14, 2001, pp. 358-365.
    • (2001) Proceedings of the Seventeenth Computer Security Applications Conference , pp. 358-365
    • Anderson, R.1
  • 22
    • 71249098465 scopus 로고    scopus 로고
    • A. Ozment, Improving Vulnerability Discovery Models: Problems with Definitions and Assumptions, in: Proceedings of the Third Workshop on Quality of Protection (QoP'07), Alexandria, VA, USA. October 29, 2007.
    • A. Ozment, "Improving Vulnerability Discovery Models: Problems with Definitions and Assumptions", in: Proceedings of the Third Workshop on Quality of Protection (QoP'07), Alexandria, VA, USA. October 29, 2007.
  • 24
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W.A. Arbaugh, W.L. Fithen and J. McHugh, "Windows of vulnerability: A case study analysis", IEEE Computer (33:12), 2000, pp. 52-59.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 27
    • 33846588487 scopus 로고    scopus 로고
    • To disclose or not? An analysis of software user behavior
    • D. Nizovtsev and M. Thursby, "To disclose or not? An analysis of software user behavior", Information Economics and Policy (19:1), 2007, pp. 43-64.
    • (2007) Information Economics and Policy , vol.19 , Issue.1 , pp. 43-64
    • Nizovtsev, D.1    Thursby, M.2
  • 33
    • 67650336988 scopus 로고    scopus 로고
    • Open and Closed Systems are Equivalent (that is, in an ideal world)
    • Feller, J, B. Fitzgerald, S.A. Hissam, and K.R. Lakhani Eds, MIT Press, Cambridge
    • R. Anderson, "Open and Closed Systems are Equivalent (that is, in an ideal world)", in: Perspectives on Free and Open Source Software, Feller, J., B. Fitzgerald, S.A. Hissam, and K.R. Lakhani (Eds.), MIT Press, Cambridge, 2005, pp. 127-142.
    • (2005) Perspectives on Free and Open Source Software , pp. 127-142
    • Anderson, R.1
  • 34
    • 71249102810 scopus 로고    scopus 로고
    • NetApplications, Global Market Share Statistics, http://marketshare.hitslink.com, 2009.
    • NetApplications, "Global Market Share Statistics, http://marketshare.hitslink.com, 2009.
  • 35
    • 71249091991 scopus 로고    scopus 로고
    • Netcraft, "Web Server Survey", http://news.netcraft.com/ archives/web-server-survey.html, 2009.
    • (2009) Web Server Survey
  • 37
    • 71249100936 scopus 로고    scopus 로고
    • NIST, Personal communication with C. Johnson, National Vulnerability Database - Program Manager, Computer Security Division Personal communication, May 2009.
    • NIST, Personal communication with C. Johnson, National Vulnerability Database - Program Manager, Computer Security Division Personal communication, May 2009.
  • 38
    • 38549172280 scopus 로고    scopus 로고
    • NIST, National
    • NIST, National Vulnerability Database, http://nvd.nist.gov, 2009.
    • (2009) Vulnerability Database


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.