메뉴 건너뛰기




Volumn , Issue , 2009, Pages 453-462

Secure open source collaboration: An empirical study of Linus' law

Author keywords

Contribution network; Developer network; Linus' law; Metric; Vulnerability

Indexed keywords

DETRIMENTAL EFFECTS; EMPIRICAL CASE STUDIES; EMPIRICAL STUDIES; HOLD UP; ONE-FACTOR; OPEN SOURCE COLLABORATION; OPEN SOURCE PROJECTS; OPEN SOURCE SOFTWARE; OPEN SOURCES; RED HATS; SECURITY VULNERABILITIES; VERSION CONTROL;

EID: 74049133901     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653717     Document Type: Conference Paper
Times cited : (108)

References (24)
  • 1
    • 70349941747 scopus 로고    scopus 로고
    • C. Bird, D. Pattison, R. D'Souza et al., Latent Social Structures in Open Source Projects, in FSE, Atlanta, GA, 2008, p. p24-36.
    • C. Bird, D. Pattison, R. D'Souza et al., "Latent Social Structures in Open Source Projects," in FSE, Atlanta, GA, 2008, p. p24-36.
  • 6
    • 34248511494 scopus 로고    scopus 로고
    • Applying Social Network Analysis to the Information in CVS Repositories
    • Edinburgh, Scotland, United Kingdom, p
    • J. M. Gonzales-Barahona, L. Lopez-Fernandez, and G. Robles, "Applying Social Network Analysis to the Information in CVS Repositories," in 2005 Mining Software Repositories, Edinburgh, Scotland, United Kingdom, 2004, p.
    • (2004) 2005 Mining Software Repositories
    • Gonzales-Barahona, J.M.1    Lopez-Fernandez, L.2    Robles, G.3
  • 7
    • 33845933082 scopus 로고    scopus 로고
    • Increased security through open source
    • J.-H. Hoepman, and B. Jacobs, "Increased security through open source," Commun. ACM, vol. 50, no. 1, p. 79-83, 2007.
    • (2007) Commun. ACM , vol.50 , Issue.1 , pp. 79-83
    • Hoepman, J.-H.1    Jacobs, B.2
  • 8
    • 3543111147 scopus 로고    scopus 로고
    • Information Technology - Software Product Evaluation,
    • ISO, ISO/IEC DIS 14598-1
    • ISO, ISO/IEC DIS 14598-1 Information Technology - Software Product Evaluation, 1996.
    • (1996)
  • 10
    • 0035561643 scopus 로고    scopus 로고
    • Rules and Tools for Software Evolution Planning and Management
    • M. M. Lehman, and J. F. Ramil, "Rules and Tools for Software Evolution Planning and Management," Annals of Software Engineering, vol. 11, no. 1, p. 15-44, 2001.
    • (2001) Annals of Software Engineering , vol.11 , Issue.1 , pp. 15-44
    • Lehman, M.M.1    Ramil, J.F.2
  • 13
    • 70450264229 scopus 로고    scopus 로고
    • Predicting Failures with Developer Networks and Social Network Analysis
    • Atlanta, GA, p. to appear
    • A. Meneely, L. Williams, J. Osborne et al., "Predicting Failures with Developer Networks and Social Network Analysis " in Foundations in Software Engineering, Atlanta, GA, 2008, p. to appear.
    • (2008) Foundations in Software Engineering
    • Meneely, A.1    Williams, L.2    Osborne, J.3
  • 14
    • 33244463047 scopus 로고    scopus 로고
    • Use of Relative Code Churn Measures to Predict System Defect Density
    • St. Louis, MO, USA
    • N. Nagappan, and T. Ball, "Use of Relative Code Churn Measures to Predict System Defect Density," in 27th International Conference on Software Engineering, St. Louis, MO, USA, 2005, p. 284-292.
    • (2005) 27th International Conference on Software Engineering , pp. 284-292
    • Nagappan, N.1    Ball, T.2
  • 16
    • 47649110051 scopus 로고    scopus 로고
    • K. Numata, S. Imoto, and S. Miyano, A Structure Learning Algorithm for Inference of Gene Networks from Microarray Gene Expression Data Using Bayesian Networks, in Bioinformatics and Bioengineering, 2007. BIBE 2007., p. 1280-1284.
    • K. Numata, S. Imoto, and S. Miyano, "A Structure Learning Algorithm for Inference of Gene Networks from Microarray Gene Expression Data Using Bayesian Networks," in Bioinformatics and Bioengineering, 2007. BIBE 2007., p. 1280-1284.
  • 20
  • 21
    • 74049144767 scopus 로고    scopus 로고
    • Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities,
    • TR-2009-10, submitted to IEEE TSE
    • Y. Shin, A. Meneely, L. Williams et al., "Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities," NCSU CSC Technical Report TR-2009-10, submitted to IEEE TSE.
    • NCSU CSC Technical Report
    • Shin, Y.1    Meneely, A.2    Williams, L.3
  • 22
    • 15044364586 scopus 로고    scopus 로고
    • Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image
    • K. Tae-Kyun, and J. Kittler, "Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, no. 3, p. 318-327, 2005.
    • (2005) Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.27 , Issue.3 , pp. 318-327
    • Tae-Kyun, K.1    Kittler, J.2
  • 23
    • 0035446933 scopus 로고    scopus 로고
    • Does Open Source Improve System Security?
    • B. Witten, C. Landwehr, and M. Caloyannides, "Does Open Source Improve System Security?," IEEE Softw., vol. 18, no. 5, p. 57-61, 2001.
    • (2001) IEEE Softw , vol.18 , Issue.5 , pp. 57-61
    • Witten, B.1    Landwehr, C.2    Caloyannides, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.