-
2
-
-
33750440197
-
The economics of information security
-
Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314, 610-613.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
7
-
-
84900605801
-
-
Paper presented at the 4th Workshop of Economic and Information Security (WEIS), Cambridge, MA, USA
-
Cavusoglu, H., Cavusoglu, H., & Raghunathan, S. (2005). Emerging issues in responsible vulnerability disclosure. Paper presented at the 4th Workshop of Economic and Information Security (WEIS), Cambridge, MA, USA.
-
(2005)
Emerging Issues in Responsible Vulnerability Disclosure
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
8
-
-
84900585209
-
Vulnerability disclosure policy
-
CERT/CC, Retrieved June 10, 2007
-
CERT/CC. (2000). Vulnerability disclosure policy. CERT Coordination Center. Retrieved June 10, 2007.
-
(2000)
CERT Coordination Center
-
-
-
12
-
-
0003570556
-
Speculative microeconomics for tomorrow's economy
-
In H. R. Varian (Ed.), Cambridge, MA, USA: MIT Press
-
DeLong, J. B., & Froomkin, A. M (2000). Speculative microeconomics for tomorrow's Economy. In H. R. Varian (Ed.), Internet publishing & beyond: The economics of digital information & intellectual. Cambridge, MA, USA: MIT Press.
-
(2000)
Internet Publishing & Beyond: The Economics of Digital Information & Intellectual
-
-
Delong, J.B.1
Froomkin, A.M.2
-
13
-
-
84900654598
-
-
Paper presented at the 21st National Information Systems Security Conference, Crystal City, Virginia, VA
-
Du, W., & Mathur, A. P. (1998). Categorization of software errors that led to security breaches. Paper presented at the 21st National Information Systems Security Conference, Crystal City, Virginia, VA.
-
(1998)
Categorization of Software Errors that Led to Security Breaches
-
-
Du, W.1
Mathur, A.P.2
-
14
-
-
84900577575
-
-
[Electronic Version], 2007. Retrieved from
-
Evers, J. (2007). Offering a bounty for security bugs [Electronic Version], 2007. Retrieved from http://news.com.com/Offering+a+bounty+for+se curity+bugs/2100-7350_3-5802411.html?tag=sas.email
-
(2007)
Offering a Bounty for Security Bugs
-
-
Evers, J.1
-
15
-
-
84900647955
-
-
Retrieved April 28, 2007, from
-
Francis, B. (2005). Know thy hacker. Retrieved April 28, 2007, from http://www.infoworld.com/article/05/01/28/05OPsecadvise_1.html
-
(2005)
Know Thy Hacker
-
-
Francis, B.1
-
16
-
-
77952415099
-
-
Paper presented at the 14 th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA
-
Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and causes of the wealth of internet miscreants. Paper presented at the 14 th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA.
-
(2007)
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
18
-
-
84900574131
-
-
Retrieved June 19, 2007, from
-
Grimes, R. A. (2005). The full disclosure debate. Retrieved June 19, 2007, from http://www.infoworld.com/article/05/09/30/40OPsecadvise_1.html
-
(2005)
The Full Disclosure Debate
-
-
Grimes, R.A.1
-
19
-
-
84869263662
-
-
IBM, [Electronic Version], Retrieved January, from
-
IBM. (2007). IBM internet security systems X-Force 2006 trend statistics [Electronic Version]. Retrieved January, from http://www.iss.net/documents/whitepapers/X_Force_Exec_Brief.pdf
-
(2007)
IBM Internet Security Systems X-Force 2006 Trend Statistics
-
-
-
20
-
-
20944441343
-
Market for software vulnerabilities?
-
Kannan, K., & Telang, R. (2005). Market for software vulnerabilities? Think again. Management Science, 51(5), 726-740.
-
(2005)
Think again Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
21
-
-
0028514027
-
A taxonomy of computer program security flaws, with examples
-
MC
-
Landwehr, C. E., Bull, A. R., Mc. Dermott, J. P., & Choi, W. S. (1994). A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3).
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.E.1
Bull, A.R.2
Dermott, J.P.3
Choi, W.S.4
-
22
-
-
84900631898
-
-
Retrieved June 10, 2007, from
-
Lemos, R. (2004). Mozilla puts bounty on bugs. Retrieved June 10, 2007, from http://news.com.com/Mozilla+puts+bounty+on+bugs/2100-1002_3-5293659.html
-
(2004)
Mozilla Puts Bounty on Bugs
-
-
Lemos, R.1
-
24
-
-
84900609925
-
-
Retrieved April 10 2007, from
-
Middleton, J. (2001). Coalition condemns full disclosure. Retrieved April 10 2007, from http://www.vnunet.com/vnunet/news/2116546/coalition-condemns-full-disclosure
-
(2001)
Coalition Condemns Full Disclosure
-
-
Middleton, J.1
-
26
-
-
84900676925
-
-
Paper presented at the Workshop of Economics and Information Security (WEIS), Minneapolis, MN
-
Ozment, A. (2004). Bug auctions: vulnerability market reconsidered. Paper presented at the Workshop of Economics and Information Security (WEIS), Minneapolis, MN.
-
(2004)
Bug Auctions: Vulnerability Market Reconsidered
-
-
Ozment, A.1
-
27
-
-
84877999984
-
-
Paper presented at the The Fifteenth Usenix Security Symposium. July 31 - August 4 2006, Vancouver, BC, Canada
-
Ozment, A., & Schechter, S. (2006). Milk or wine: does software security improve with age? Paper presented at the The Fifteenth Usenix Security Symposium. July 31 - August 4 2006, Vancouver, BC, Canada.
-
(2006)
Milk or Wine: Does Software Security Improve with Age
-
-
Ozment, A.1
Schechter, S.2
-
28
-
-
84900569223
-
-
PandaLabs, Electronic Version, Retrieved July 15, 2007, from
-
PandaLabs. (2007). Quarterly report PandaLabs [Electronic Version]. Retrieved July 15, 2007, from http://www.pandasecurity.com/
-
(2007)
Quarterly Report PandaLabs
-
-
-
29
-
-
0003644687
-
-
Harlow, England, Pearson Addison Wesley
-
Parkin, M., Powell, M., & Matthews, K. Economics. (2005). Harlow, England: Pearson Addison Wesley.
-
(2005)
Economics
-
-
Parkin, M.1
Powell, M.2
Matthews, K.3
-
30
-
-
0003534217
-
-
(Fourth Edition ed.). Boston: Pearson, Addison Wesley
-
Perloff, J. M. (2007). Microeconomics (Fourth Edition ed.). Boston: Pearson, Addison Wesley.
-
(2007)
Microeconomics
-
-
Perloff, J.M.1
-
33
-
-
84900649672
-
-
Retrieved June 19, 2007, from
-
Rauch, J. (1999). The Future of vulnerability disclosure? Retrieved June 19, 2007, from http://www.usenix.org/publications/login/1999-11/features/disclosure.html
-
(1999)
The Future of Vulnerability Disclosure
-
-
Rauch, J.1
-
35
-
-
84900628898
-
-
Paper presented at the The Third Workshop on the Economics of Information Security, Minneapolis
-
Rescola, E. (2004). Is finding security holes a good idea? Paper presented at the The Third Workshop on the Economics of Information Security, Minneapolis.
-
(2004)
Is Finding Security Holes a Good Idea
-
-
Rescola, E.1
-
38
-
-
78649277196
-
-
a, Crypto-Gram Newsletter Retrieved March 10, 2006, from
-
Schneier, B. (2000a). Full disclosure and the window of exposure. Crypto-Gram Newsletter Retrieved March 10, 2006, from http://www.schneier.com/crypto-gram-0009.html#1
-
(2000)
Full Disclosure and the Window of Exposure
-
-
Schneier, B.1
-
39
-
-
84900585816
-
-
b, Retrieved April 10, 2007, from
-
Schneier, B. (2000b). Publicizing vulnerabilities. Retrieved April 10, 2007, from http://www.schneier.com/crypto-gram-0002.html
-
(2000)
Publicizing Vulnerabilities
-
-
Schneier, B.1
-
40
-
-
33947412832
-
-
Retrieved April 10, 2007, from
-
Schneier, B. (2001). Bug secrecy vs. full disclosure. Retrieved April 10, 2007, from http://news.zdnet.com/2100-9595_22-531066.html
-
(2001)
Bug Secrecy Vs. Full Disclosure
-
-
Schneier, B.1
-
41
-
-
84900676434
-
-
Retrieved December 12, 2006, from
-
Schneier, B. (2006). Economics and information security. Retrieved December 12, 2006, from http://www.schneier.com/blog/archives/2006/06/economics_and_i_1.html
-
(2006)
Economics and Information Security
-
-
Schneier, B.1
-
45
-
-
84900646704
-
-
Paper presented at the The Fifth Workshop on the Economics of Information Security (WEIS), Robinson College, University of Cambridge, England
-
Sutton, M., & Nagle, F. (2006). Emerging economic models for vulnerability research. Paper presented at the The Fifth Workshop on the Economics of Information Security (WEIS), Robinson College, University of Cambridge, England.
-
(2006)
Emerging Economic Models for Vulnerability Research
-
-
Sutton, M.1
Nagle, F.2
-
46
-
-
66249106228
-
-
Symantec, [Electronic Version]. Retrieved January, from
-
Symantec. (2008). Symantec Global Internet Threat Report: Trend for July - Dec 07, [Electronic Version]. Retrieved January, from http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf
-
(2008)
Symantec Global Internet Threat Report: Trend for July - Dec 07
-
-
-
48
-
-
77950621688
-
-
[Electronic Version], Honeyblog. Retrieved February 25, 2008, from
-
Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., & Zou, W. (2007). Studying malicious websites and the underground economy on the Chinese website [Electronic Version]. Honeyblog. Retrieved February 25, 2008, from http://honeyblog.org/archives/2007/12/summary.html
-
(2007)
Studying Malicious Websites and the Underground Economy on the Chinese Website
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|