This study seeks to empirically investigate specific security characteristics of both open source software and proprietary software. Operating system software vulnerability data spanning several years are collected and analyzed to determine if significant differences exist in terms of inter-arrival times of published vulnerabilities and patch releases. Open source software is only marginally quicker in releasing patches for reported vulnerabilities. The arguments favoring the inherent security of open source software do not appear to hold up to scrutiny. These findings provide evidence to security managers to focus more on holistic software security management, irrespective of the proprietary-nature of the underlying software
It is difficult for end-users to judge the risk posed by software security vulnerabilities. This the...
This paper examines one aspect of quality that organizations look for when selecting software, namel...
Meaningful metrics and methods for measuring software security would greatly improve the security of...
This study seeks to empirically investigate specific security characteristics of both open source so...
Reviewing literature on open source and closed source security reveals that the discussion is often ...
The success of products like Apache and Linux has propelled increased awareness and adoption of open...
Reviewing literature on open source and closed source security reveals that the discussion is often ...
While many theoretical arguments against or in favor of open source and closed source software devel...
The argument whether open-source code is more secure than proprietary software has more or less been...
Abstract-There's been a lot of debate by security practitioners about the impact of open source...
The increasing availability and deployment of open source software in personal and commercial enviro...
While many theoretical arguments against or in favor of open source and closed source software devel...
Reducing the time taken to discover and fix vulnerabilities in open source software projects is incr...
Online appendix of the paper entitled: "The Secret Life of Software Vulnerabilities: A Large-Scale E...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
It is difficult for end-users to judge the risk posed by software security vulnerabilities. This the...
This paper examines one aspect of quality that organizations look for when selecting software, namel...
Meaningful metrics and methods for measuring software security would greatly improve the security of...
This study seeks to empirically investigate specific security characteristics of both open source so...
Reviewing literature on open source and closed source security reveals that the discussion is often ...
The success of products like Apache and Linux has propelled increased awareness and adoption of open...
Reviewing literature on open source and closed source security reveals that the discussion is often ...
While many theoretical arguments against or in favor of open source and closed source software devel...
The argument whether open-source code is more secure than proprietary software has more or less been...
Abstract-There's been a lot of debate by security practitioners about the impact of open source...
The increasing availability and deployment of open source software in personal and commercial enviro...
While many theoretical arguments against or in favor of open source and closed source software devel...
Reducing the time taken to discover and fix vulnerabilities in open source software projects is incr...
Online appendix of the paper entitled: "The Secret Life of Software Vulnerabilities: A Large-Scale E...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
It is difficult for end-users to judge the risk posed by software security vulnerabilities. This the...
This paper examines one aspect of quality that organizations look for when selecting software, namel...
Meaningful metrics and methods for measuring software security would greatly improve the security of...