Open source: does transparency lead to security?

被引:2
|
作者
机构
来源
Comput. Fraud Secur. | 2008年 / 9卷 / 11-13期
关键词
Best practices - Closed source - Community involvement - Open source developers - Open source projects - Proprietary software - Quality of softwares - Security vulnerabilities;
D O I
10.1016/S1361-3723(08)70137-4
中图分类号
学科分类号
摘要
A recent report criticising the security of open source software, and a flame war among Linux developers, have cast some doubts on whether open source software can achieve a sufficiently high level of security. Yet others believe that the principles of transparency and community involvement actually contribute to higher levels of software quality, including security, than can be achieved in the closed world of proprietary software. It's an important issue as open source projects continue their inroads into mainstream, enterprise solutions. Steve Mansfield-Devine examines the arguments and touches on the efforts being made to develop best practices, methodologies and tools to ensure security in open source software. Debates about open source software quickly develop a religious dimension. And nothing is more likely to set off an argument of inquisitional proportions than accusations of shortcomings in an area as important as security. Two recent events highlighted the issue of the security of open source software (OSS): one was a report claiming that open source developers are failing to achieve the necessary standards. The other was a suggestion that Linux kernel developers may have tried to cover up security vulnerabilities. However, when it comes to ensuring the quality of software from a security standpoint, is there really any difference between open source and closed source? © 2008 Elsevier Ltd. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [31] Open Source Security Information Management System Supporting IT Security Audit
    Hermanowski, Damian
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 336 - 341
  • [32] Does open source have a future in medicine?
    Gage, JS
    M D COMPUTING, 1999, 16 (05): : 52 - 53
  • [33] Security Evaluation Criteria of Open-Source Libraries
    Mills, Vivian
    Butakov, Sergey
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART V, 2022, 13381 : 422 - 435
  • [34] An Open-Source Cloud Testbed for Security Experimentation
    Minna, Francesco
    Massacci, Fabio
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 756 - 759
  • [35] Recent and noteworthy open source transportation security developments
    Thomas, Andrew R.
    JOURNAL OF TRANSPORTATION SECURITY, 2008, 1 (01) : 67 - 70
  • [36] Top open-source security tools for Unix
    Gaur, Nalneesh
    Unix Review, 1999, 17 (08):
  • [37] Open-Source OPC UA Security and Scalability
    Muehlbauer, Nikolas
    Kirdan, Erkin
    Pahl, Marc-Oliver
    Carle, Georg
    2020 25TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2020, : 262 - 269
  • [38] VoIP Security regarding the Open Source Software Asterisk
    Detken, Kai-Oliver
    Eren, Evren
    IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL I, PROCEEDINGS, 2008, : 93 - +
  • [39] FISMOS - An FPGA Implementation of a Security Module as Open Source
    Schubaur, Philipp
    Knauer, Peter
    Merli, Dominik
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [40] Industry-Wide Analysis of Open Source Security
    Zhang, Yiming
    Malhotra, Baljeet
    Chen, Cheng
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 227 - 236