-
1
-
-
26444516466
-
-
Alhazmi, O., Malaiya, Y. and Ray, I. (2005) Security Vulnerabilities, in Software Systems: A Quantitative Perspective in Data and Applications Security 2005, LNCS 3654, 281-294.
-
(2005)
Security Vulnerabilities, in Software Systems: A Quantitative Perspective in Data and Applications Security 2005, LNCS 3654
, pp. 281-294
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, I.3
-
2
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
in
-
Alhazmi, O., Malaiya, Y., Ray, I. (2007) Measuring, analyzing and predicting security vulnerabilities in software systems, in Computers & Security, 26, 3, 219-228.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, I.3
-
3
-
-
67650336988
-
Open and Closed Systems are Equivalent (that is, in an ideal world)
-
in Feller, J., Fitzgerald, B., Hissam, S. A. and Lakhani, K.R. (Eds.) MIT Press, Cambridge
-
Anderson, R. (2005) Open and Closed Systems are Equivalent (that is, in an ideal world), in Feller, J., Fitzgerald, B., Hissam, S. A. and Lakhani, K.R. (Eds.) Perspectives on Free and Open Source Software, MIT Press, Cambridge, 127-142.
-
(2005)
Perspectives on Free and Open Source Software
, pp. 127-142
-
-
Anderson, R.1
-
4
-
-
26444448266
-
Security in Open versus Closed Systems-The Dance of Boltzmann, Coase and Moore
-
Toulouse, France, June 20-21
-
Anderson, R. (2002) Security in Open versus Closed Systems-The Dance of Boltzmann, Coase and Moore, in Proceedings of the Conference on Open Source Software Economics, Toulouse, France, June 20-21, 1-13.
-
(2002)
Proceedings of the Conference on Open Source Software Economics
, pp. 1-13
-
-
Anderson, R.1
-
6
-
-
38149097274
-
Impact of Vulnerability Disclosure and Patch Availability-An Empirical Analysis
-
University of Minnesota, May 13-14
-
Arora, A., Krishnan, R., Nandkumar, A., Telang, R. and Yang, Y. (2004) Impact of Vulnerability Disclosure and Patch Availability-An Empirical Analysis, in Proceedings of the Third Workshop on the Economics of Information Security, University of Minnesota, May 13-14, 1-20.
-
(2004)
Proceedings of the Third Workshop on the Economics of Information Security
, pp. 1-20
-
-
Arora, A.1
Krishnan, R.2
Nandkumar, A.3
Telang, R.4
Yang, Y.5
-
7
-
-
33646141892
-
Optimal Policy for Software Vulnerability Disclosure
-
in, University of Minnesota, May 13-14
-
Arora, A., Telang, A. and Xu, H. (2004), "Optimal Policy for Software Vulnerability Disclosure", in Proceedings of the Third Annual Workshop on Economics and Information Security, University of Minnesota, May 13-14, 52-59.
-
(2004)
Proceedings of the Third Annual Workshop on Economics and Information Security
, pp. 52-59
-
-
Arora, A.1
Telang, A.2
Xu, H.3
-
9
-
-
0037840250
-
-
Free Software Foundation (FSF)
-
Free Software Foundation (FSF) (2007) The Free Software Definition, http://www.fsf.org/licensing/essays/free-sw.html.
-
(2007)
The Free Software Definition
-
-
-
10
-
-
4243120803
-
A look at the economics of open source
-
in
-
Glass, R.L. (2004) A look at the economics of open source, in Comm. of the ACM, 47,2, 25-27.
-
(2004)
Comm. of the ACM
, vol.47
, Issue.2
, pp. 25-27
-
-
Glass, R.L.1
-
11
-
-
0018505572
-
Time-Dependent Error-Detection Rate Model for Software and Other Performance Measures
-
in
-
Goel, A.L. and Okumoto, K. (1979) Time-Dependent Error-Detection Rate Model for Software and Other Performance Measures, in IEEE Transactions on Reliability, 28, 3, 206-211.
-
(1979)
IEEE Transactions on Reliability
, vol.28
, Issue.3
, pp. 206-211
-
-
Goel, A.L.1
Okumoto, K.2
-
13
-
-
0033489651
-
On the functional relation between security and dependability impairments
-
Caledon Hills, Ontario, Canada, September 22-24
-
Jonsson, E., Strömberg, L. and Lindskog, S. (2000) On the functional relation between security and dependability impairments, in Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, Ontario, Canada, September 22-24, 104-111.
-
(2000)
Proceedings of the 1999 Workshop on New Security Paradigms
, pp. 104-111
-
-
Jonsson, E.1
Strömberg, L.2
Lindskog, S.3
-
14
-
-
33646512647
-
Software vulnerability: Definition, modelling, and practical evaluation for e-mail transfer software
-
in
-
Kimura, M. (2006) Software vulnerability: definition, modelling, and practical evaluation for e-mail transfer software, in International Journal of Pressure Vessels and Piping, 83, 4, 256-261.
-
(2006)
International Journal of Pressure Vessels and Piping
, vol.83
, Issue.4
, pp. 256-261
-
-
Kimura, M.1
-
16
-
-
72949104031
-
Open source vs. Windows: Security debate rages
-
in
-
Messmer, E. (2005) Open source vs. Windows: security debate rages, in Network World, 22, 26, 26-27.
-
(2005)
Network World
, vol.22
, Issue.26
, pp. 26-27
-
-
Messmer, E.1
-
18
-
-
84870335870
-
DHS backs open-source security
-
in
-
Naraine, R. (2006) DHS backs open-source security, in eWeek, 23, 3, 20.
-
(2006)
eWeek
, vol.23
, Issue.3
, pp. 20
-
-
Naraine, R.1
-
19
-
-
33846588487
-
To disclose or not? An analysis of software user behavior
-
in
-
Nizovtsev, D. and Thursby, M. (2007) To disclose or not? An analysis of software user behavior, in Information Economics and Policy, 19, 1, 43-64.
-
(2007)
Information Economics and Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.1
Thursby, M.2
-
20
-
-
33749187416
-
-
Open Source Initiative (OSI)
-
Open Source Initiative (OSI) (2006) The Open Source Definition, http://www.opensource.org/docs/osd.
-
(2006)
The Open Source Definition
-
-
-
21
-
-
67650336989
-
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
-
Harvard University, June 2-3, Cambridge, Massachusetts
-
Ozment, A. (2005) The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting, in Proceedings of the Fourth Workshop on the Economics of Information Security, Harvard University, June 2-3, Cambridge, Massachusetts, 1-21.
-
(2005)
Proceedings of the Fourth Workshop on the Economics of Information Security
, pp. 1-21
-
-
Ozment, A.1
-
22
-
-
0036116939
-
On the security of open source software
-
in
-
Payne, C. (2002) On the security of open source software, in Information Systems Journal, 12, 1, 61-78.
-
(2002)
Information Systems Journal
, vol.12
, Issue.1
, pp. 61-78
-
-
Payne, C.1
-
25
-
-
71249148719
-
Open Source vs. Closed Source Software: Towards Measuring Security
-
in, Honolulu, Hawaii, USA, March 8-12
-
Schryen, G. and Kadura, R. (2009) Open Source vs. Closed Source Software: Towards Measuring Security, in Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, Hawaii, USA, March 8-12, 2016-2023.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2016-2023
-
-
Schryen, G.1
Kadura, R.2
-
27
-
-
0035446933
-
Does open source improve system security?
-
in
-
Witten, B., Landwehr, C. and Caloyannidis, M. (2001) Does open source improve system security?, in IEEE Software, 18,5, 57-61.
-
(2001)
IEEE Software
, vol.18
, Issue.5
, pp. 57-61
-
-
Witten, B.1
Landwehr, C.2
Caloyannidis, M.3
|