Economies of software vulnerability disclosure
Publication
, Journal Article
Arora, A; Rahul, T
Published in: IEEE Security and Privacy
January 1, 2005
A theoritical framework identifying the key data elements which needs to develop a sensible way of handling vulnerability is discussed. Two data sets to identify the vendor response to attack data fom honeypot is also presented. Bugtraq contains details of the vulnerabilities as well as links to exploit codes is also discussed. The outcome of any policy depends on three major sets of participants such as software vendors, software users and white and blackhat hackers.
Duke Scholars
Published In
IEEE Security and Privacy
DOI
ISSN
1540-7993
Publication Date
January 1, 2005
Volume
3
Issue
1
Start / End Page
20 / 25
Related Subject Headings
- Strategic, Defence & Security Studies
- 4604 Cybersecurity and privacy
- 0804 Data Format
- 0803 Computer Software
- 0802 Computation Theory and Mathematics
Citation
APA
Chicago
ICMJE
MLA
NLM
Arora, A., & Rahul, T. (2005). Economies of software vulnerability disclosure. IEEE Security and Privacy, 3(1), 20–25. https://doi.org/10.1109/MSP.2005.12
Arora, A., and T. Rahul. “Economies of software vulnerability disclosure.” IEEE Security and Privacy 3, no. 1 (January 1, 2005): 20–25. https://doi.org/10.1109/MSP.2005.12.
Arora A, Rahul T. Economies of software vulnerability disclosure. IEEE Security and Privacy. 2005 Jan 1;3(1):20–5.
Arora, A., and T. Rahul. “Economies of software vulnerability disclosure.” IEEE Security and Privacy, vol. 3, no. 1, Jan. 2005, pp. 20–25. Scopus, doi:10.1109/MSP.2005.12.
Arora A, Rahul T. Economies of software vulnerability disclosure. IEEE Security and Privacy. 2005 Jan 1;3(1):20–25.
Published In
IEEE Security and Privacy
DOI
ISSN
1540-7993
Publication Date
January 1, 2005
Volume
3
Issue
1
Start / End Page
20 / 25
Related Subject Headings
- Strategic, Defence & Security Studies
- 4604 Cybersecurity and privacy
- 0804 Data Format
- 0803 Computer Software
- 0802 Computation Theory and Mathematics