The Open Source approach opportunities and limitations with respect to security and privacy
نویسندگان
چکیده
TodayÕs software often does not even fulfil basic security or privacy requirements. Some people regard the open source paradigm as the solution to this problem. First, we carefully explain the security and privacy aspects of open source, which in particular offer the possibility for a dramatic increase in trustworthiness for and autonomy of the user. We show which expectations for an improvement of the software trustworthiness dilemma are realistic. Finally, we describe measures necessary for developing secure and trustworthy open source systems.
منابع مشابه
Reading the effect of light and color with the approach of emotional security in the Qajar houses of Tabriz
The effects of light and color occur over time, meaning that space users stay in space for long periods of time and are exposed to various energies radiated by light. Many studies have been done on the effect of natural light on the human body and soul, which repeat the undeniable role of natural light on behavior, attitude and performance of individuals. However, despite the fact that natural ...
متن کاملA study on the role of the landscape design with the approach of solving the limitations of use for women in the coastal areas in Iran as an Islamic country
The coastal landscape is relatively new and complex category that offers the potential of sharing the sciences of architecture, perspective, nature and the environment, tourism and hospitality, beyond their physical effects on one another, their widespread effects in enhancing identity and the quality of the architectural atmosphere cannot be ignored. Approaches to greeting with beaches in Isla...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 21 شماره
صفحات -
تاریخ انتشار 2002