𝔖 Bobbio Scriptorium
✦   LIBER   ✦

The availability of source code in relation to timely response to security vulnerabilities

✍ Scribed by John Reinke; Hossein Saiedian


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
199 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


Once a vulnerability has been found in an application or service that runs on a computer connected to the Internet, fixing that exploit in a timely fashion is of the utmost importance. There are two parts to fixing vulnerability: a party acting on behalf of the application's vendor gives instructions to fix it or makes a patch available that can be downloaded; then someone using that information fixes the computer or application in question. This paper considers the effects of proprietary software versus non-proprietary software in determining the speed with which a security fix is made available, since this can minimize the amount of time that the computer system remains vulnerable.


πŸ“œ SIMILAR VOLUMES


An early application of the Bell Labs Se
✍ Vijay K. Gurbani; Andrew R. McGee πŸ“‚ Article πŸ“… 2007 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 173 KB

The Bell Labs Security Framework provides a comprehensive matrix that can be used to evaluate the security of an application (service), host, protocol, or communication link. The methodology has been used to assess the security of information technology (IT) and telecommunications services, as well

ON THE SIGNIFICANCE OF AN INTENSIVE SURV
✍ K. Minoura; K. Hiramatsu πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 95 KB

The intensive method survey makes detailed descriptions of a small number of cases, while the extensive method seeks to derive general laws from quantitative (in most cases statistical) analysis of the information collected on limited factors from a large number of cases. Although the extensive meth