"Software Patents" - IT-Security at Stake?

نویسنده

  • Robert A. Gehring
چکیده

Short abstract This paper in short1 presents the thesis that insecurity of software is due to interaction of technological and legal shortcomings, fostered by economic rationality. Ineffective liability laws further the distribution of unreliable and insecure software. Copyright protection for software hinders the quality improvement. Patent protection encourages the use of proprietary instead of standard technology. Open source development is proposed as a starting point for a risk management strategy to improve the situation. Existing patent laws need therefore be modified to include a "source code privilege".

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Patents " — IT – Security at Stake ?

This paper 1 presents the thesis that insecurity of software is due to interaction of technological and legal shortcomings, fostered by economic rationality. Ineffective liability laws further the distribution of unreliable and insecure software. Copyright protection for software hinders the quality improvement. Patent protection encourages the use of proprietary instead of standard technology....

متن کامل

The Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanisms

This paper presents results of the quantification of security threats of e-learning system using an economic measure abridged by MFC (Mean Failure Cost). We study means to optimize this measure and to make it more precise, more useful in practice. First we develop basic security requirements taxonomy adapted to all context and systems because security requirements lacks a clear basic taxonomy. ...

متن کامل

Update/Patch Management Systems: A Protocol Taxonomy with Security Implications

Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, and installation of updates, the software industry has responded with update and patch management systems. Because of the proprietary nature of these systems, improvement efforts by academic researchers are greatly restri...

متن کامل

NeuCoin: the First Secure, Cost-efficient and Decentralized Cryptocurrency

NeuCoin is a decentralized peer-to-peer cryptocurrency derived from Sunny King’s Peercoin, which itself was derived from Satoshi Nakamoto’s Bitcoin. As with Peercoin, proof-of-stake replaces proof-of-work as NeuCoin’s security model, effectively replacing the operating costs of Bitcoin miners (electricity, computers) with the capital costs of holding the currency. Proof-of-stake also avoids pro...

متن کامل

Silver Bullet Talks with Peiter (Mudge) Zatko

P Zatko, better known in the security community as Mudge, was one of the leaders of the L0pht hacker collective, which contributed significantly to the disclosure of serious Internet vulnerabilities and eventually became the security consultancy @stake. He has worked as a division scientist at BBN Technologies, a project manager for DARPA, and a researcher at Google. He’s currently working on a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001