The Open Source approach opportunities and limitations with respect to security and privacy

نویسندگان

  • Marit Hansen
  • Kristian Köhntopp
  • Andreas Pfitzmann
چکیده

TodayÕs software often does not even fulfil basic security or privacy requirements. Some people regard the open source paradigm as the solution to this problem. First, we carefully explain the security and privacy aspects of open source, which in particular offer the possibility for a dramatic increase in trustworthiness for and autonomy of the user. We show which expectations for an improvement of the software trustworthiness dilemma are realistic. Finally, we describe measures necessary for developing secure and trustworthy open source systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reading the effect of light and color with the approach of emotional security in the Qajar houses of Tabriz

The effects of light and color occur over time, meaning that space users stay in space for long periods of time and are exposed to various energies radiated by light. Many studies have been done on the effect of natural light on the human body and soul, which repeat the undeniable role of natural light on behavior, attitude and performance of individuals. However, despite the fact that natural ...

متن کامل

A study on the role of the landscape design with the approach of solving the limitations of use for women in the coastal areas in Iran as an Islamic country

The coastal landscape is relatively new and complex category that offers the potential of sharing the sciences of architecture, perspective, nature and the environment, tourism and hospitality, beyond their physical effects on one another, their widespread effects in enhancing identity and the quality of the architectural atmosphere cannot be ignored. Approaches to greeting with beaches in Isla...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2002