Abstract
It may seem counterintuitive, but going "open" all the way offers the most security.
- Anderson, R. Security in open versus closed systems---The dance of Boltzmann, Coase and Moore. In Proceedings of the Conference on Open Source Software Economics (Toulouse, France, June 20--21 2002).Google Scholar
- Brown, K. Opening the open source debate. Technical report, Alexis de Tocqueville Institution, June 2002.Google Scholar
- Cowan, C. Software security for open-source systems. IEEE J. Security & Privacy 1, 1 (2003), 38--45. Google Scholar
Digital Library
- Glass, R.L. A look at the economics of open source. Comm. ACM 47, 2 (Feb. 2004), 25--27. Google Scholar
Digital Library
- Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires, IX (1983), 5--38 (Also Jan. 1883, 161--191 and Feb. 1883).Google Scholar
- Kohno, T., Stubblefield, A., Rubin, A.D., and Wallach, D.S. Analysis of an electronic voting system. In Proceedings of the IEEE Conference on Security & Privacy, (Oakland, CA, May 9--12 2004).Google Scholar
Cross Ref
- Mercuri, R.T., and Neumann, P.G. Inside Risks: Security by obscurity. Comm. ACM 46, 11 (Dec. 2003), 160. Google Scholar
Digital Library
- Neumann, P.G. Inside Risks: Information system security redux. Comm. ACM 46, 10 (Oct. 2003), 136. Google Scholar
Digital Library
- Provos, N. Improving host security with system call policies. In Proceedings of the 12th USENIX Security Symposium (Washington D.C., Aug. 2003) Google Scholar
Digital Library
- Raymond, E.S. The Cathedral and the Bazaar, 2000. Google Scholar
Digital Library
- Thompson, K. Reflections on trusting trust. Comm. ACM 27, 8 (Aug. 1984), 761--763. Google Scholar
Digital Library
- Witten, B., Landwehr, C., and Caloyannides, M. Does open source improve system security? IEEE Software, (Sept.--Oct. 2001), 57--61. Google Scholar
Digital Library
Index Terms
Increased security through open source
Recommendations
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who are interested in exploiting software vulnerabilities. This deployment has ...
Open Source Security: Opportunity or Oxymoron?
As the computer industry focuses on system and network security, a growing number of users are taking a closer look at open source software in order to gauge whether its potential advantages outweigh its possible disadvantages. Although open source ...
Open source software licenses: Strong-copyleft, non-copyleft, or somewhere in between?
Studies on open source software (OSS) have shown that the license under which an OSS is released has an impact on the success or failure of the software. In this paper, we model the relationship between an OSS developer's utility, the effort that goes ...





Comments