Open source: does transparency lead to security?

被引:2
|
作者
机构
来源
Comput. Fraud Secur. | 2008年 / 9卷 / 11-13期
关键词
Best practices - Closed source - Community involvement - Open source developers - Open source projects - Proprietary software - Quality of softwares - Security vulnerabilities;
D O I
10.1016/S1361-3723(08)70137-4
中图分类号
学科分类号
摘要
A recent report criticising the security of open source software, and a flame war among Linux developers, have cast some doubts on whether open source software can achieve a sufficiently high level of security. Yet others believe that the principles of transparency and community involvement actually contribute to higher levels of software quality, including security, than can be achieved in the closed world of proprietary software. It's an important issue as open source projects continue their inroads into mainstream, enterprise solutions. Steve Mansfield-Devine examines the arguments and touches on the efforts being made to develop best practices, methodologies and tools to ensure security in open source software. Debates about open source software quickly develop a religious dimension. And nothing is more likely to set off an argument of inquisitional proportions than accusations of shortcomings in an area as important as security. Two recent events highlighted the issue of the security of open source software (OSS): one was a report claiming that open source developers are failing to achieve the necessary standards. The other was a suggestion that Linux kernel developers may have tried to cover up security vulnerabilities. However, when it comes to ensuring the quality of software from a security standpoint, is there really any difference between open source and closed source? © 2008 Elsevier Ltd. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [21] A Survey on Network Security Tools for Open Source
    Mandal, Nabanita
    Jadhav, Sonali
    2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), 2016,
  • [22] Open Source Supply Chain Security at Google
    Cox, Russ
    PROCEEDINGS OF THE 2023 WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2023, 2023, : 3 - 3
  • [23] Trusting strangers - Open source software and security
    Landwehr, CE
    BUILDING THE INFORMATION SOCIETY, 2004, 156 : 679 - 683
  • [24] Open source security-still a myth
    Vieg, John
    Database and Network Journal, 2004, 35 (06): : 15 - 17
  • [25] Clarity About Transparency: Software Transparency and Open Source Software Licenses in the US Public Sector
    Holbrook, Luke D.
    IEEE SOFTWARE, 2023, 40 (04) : 71 - 76
  • [26] Security Analysis in Open Source Linux Network
    Mishra, Mukesh Kumar
    Goyal, Dinesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 68 - 72
  • [27] Enforcing security policies in open source JVM
    Wei, Da
    Jin, Ying
    Zhang, Jing
    Zheng, Xiao-Juan
    Li, Zhuo
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (SUPPL.): : 36 - 41
  • [28] Web Server Security on Open Source Environments
    Gkoutzelis, Dimitrios X.
    Sardis, Manolis S.
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 236 - +
  • [29] Removing a false sense of (open source) security
    Williams J.
    Computer Fraud and Security, 2020, 2020 (06): : 8 - 10
  • [30] Reconciling Contradictions of Open Data Regarding Transparency, Privacy, Security and Trust
    Meijer, Ronald
    Conradie, Peter
    Choenni, Sunil
    JOURNAL OF THEORETICAL AND APPLIED ELECTRONIC COMMERCE RESEARCH, 2014, 9 (03): : 32 - 44