Papers

Export 16 results:
Filters: Keyword is security  [Clear All Filters]
Journal Article
P. P. Swire, A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems, Hous. L. Rev., vol. 42, p. 1333, 2005.PDF icon KP21 03 Swire.pdf (294.24 KB)
C. Cowan, Software security for open-source systems, IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 38 - 45, 2003.
C. Payne, On the security of open source software, Information systems journal, vol. 12, pp. 61–78, 2002.PDF icon Payne2002_ISJ12_SecurityOSS.pdf (111.53 KB)
G. Schryen, Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities, AMCIS 2009 Proceedings, p. 387, 2009.PDF icon Schryen_-_AMCIS_09_-_Security_of_open_source_and_closed_source_software_-_Web_version.pdf (442.07 KB)
M. Hansen, Köhntopp, K., and Pfitzmann, A., The Open Source approach—opportunities and limitations with respect to security and privacy, Computers & Security, vol. 21, pp. 461–471, 2002.Microsoft Office document icon HaKP_02OpenSource_0214.doc (2.5 MB)
J. - H. Hoepman and Jacobs, B., Increased security through open source, Communications of the ACM, vol. 50, pp. 79–83, 2007.PDF icon 0801.3924.pdf (95.95 KB)
B. Witten, Landwehr, C., and Caloyannides, M., Does open source improve system security?, IEEE Software, vol. 18, pp. 57–61, 2001.PDF icon 01579ad1c373ed59a19eba0396f7f0cb7a0e.pdf (121.65 KB)
J. Reinke and Saiedian, H., The availability of source code in relation to timely response to security vulnerabilities, Computers & Security, vol. 22, pp. 707 - 724, 2003.
Conference Paper
P. Anbalagan and Vouk, M., Towards a bayesian approach in modeling the disclosure of unique security faults in open source projects, in Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 2010, pp. 101–110.PDF icon 0b13ae1e6317c7e31f6b8783f669b978ffb3.pdf (762.61 KB)
N. Good, Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J., Stopping spyware at the gate: a user study of privacy, notice and spyware, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.
D. Pletea, Vasilescu, B., and Serebrenik, A., Security and Emotion: Sentiment Analysis of Security Discussions on GitHub, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351.PDF icon pletea.pdf (250.26 KB)
W. Scacchi and Alspaugh, T. A., Processes in Securing Open Architecture Software Systems, in Proceedings of the 2013 International Conference on Software and System Process, New York, NY, USA, 2013, pp. 126–135.PDF icon Scacchi-Alspaugh-ICSSP13.pdf (1.27 MB)
A. Mauczka, Schanes, C., Fankhauser, F., Bernhart, M., and Grechenig, T., Mining security changes in FreeBSD, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 90 - 93.
Book Chapter
A. Bosu, Carver, J. C., Hafiz, M., Hilley, P., and Janni, D., When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 234-236.
R. Anderson, Open and Closed Systems are Equivalent (that is, in an ideal world), in Perspectives on free and open source software, MIT Press, 2005, pp. 127-142.PDF icon toulousebook.pdf (162.36 KB)