{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:52:53Z","timestamp":1730314373394,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,8]]},"DOI":"10.1145\/1529282.1529731","type":"proceedings-article","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T13:37:11Z","timestamp":1239802631000},"page":"2016-2023","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Open source vs. closed source software"],"prefix":"10.1145","author":[{"given":"Guido","family":"Schryen","sequence":"first","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Rouven","family":"Kadura","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,3,8]]},"reference":[{"volume-title":"Annual Reliability and Maintainability Symposium","year":"1995","author":"Alhazmi O.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_21"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"e_1_3_2_1_4_1","first-page":"220","article-title":"Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On. In Damiani, E., Fitzgerald, B., Scacchi, W., Scotto, M. and Succi, G. (Eds.) Open Source Systems, Springer","volume":"209","author":"Ardagna C. A.","year":"2006","journal-title":"Boston"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.601"},{"key":"e_1_3_2_1_7_1","unstructured":"Fisher D. Open source: a false sense of security? eWeek 19 39 (2002) 20--21. Fisher D. Open source: a false sense of security? eWeek 19 39 (2002) 20--21."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217256.1217267"},{"key":"e_1_3_2_1_9_1","unstructured":"Free Software Foundation (FSF) The Free Software Definition 2007. Free Software Foundation (FSF) The Free Software Definition 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966409"},{"key":"e_1_3_2_1_11_1","first-page":"206","article-title":"Time-Dependent Error-Detection Rate Model for Software and Other Performance Measures","volume":"28","author":"Goel A. L.","journal-title":"IEEE Transactions on Reliability"},{"volume-title":"On the Integration of Security and Dependability in Computer Systems. In IASTED International Conference on Reliability, Quality Control and Risk Assessment","year":"1992","author":"Jonsson E.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335204"},{"key":"e_1_3_2_1_15_1","unstructured":"Kerckhoffs A. La cryptographie militaire. Journal des sciences militaires IX 1883 161--191. Kerckhoffs A. La cryptographie militaire. Journal des sciences militaires IX 1883 161--191."},{"volume-title":"International Journal of Pressure Vessels and Piping, 83, 4","year":"2006","author":"Kimura M.","key":"e_1_3_2_1_16_1"},{"volume-title":"Springer","year":"1992","author":"Laprie J. C.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Levy E. Wide open source\" http:\/\/www.securityfocus.com\/news\/19 2000. Levy E. Wide open source\" http:\/\/www.securityfocus.com\/news\/19 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1993-22-308"},{"key":"e_1_3_2_1_21_1","first-page":"26","article-title":"Open source vs. Windows: security debate rages","volume":"22","author":"Messmer E","year":"2005","journal-title":"Network World"},{"key":"e_1_3_2_1_22_1","unstructured":"Naraine R. DHS backs open-source security eWeek 23 3 (2006) 20. Naraine R. DHS backs open-source security eWeek 23 3 (2006) 20."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2006.10.001"},{"key":"e_1_3_2_1_24_1","unstructured":"OpenOffice.org Active Projects of OpenOffice.org 2008 http:\/\/projects.openoffice.org\/index.html#components. OpenOffice.org Active Projects of OpenOffice.org 2008 http:\/\/projects.openoffice.org\/index.html#components."},{"key":"e_1_3_2_1_25_1","unstructured":"Open Source Initiative (OSI) The Open Source Definition 2006. Open Source Initiative (OSI) The Open Source Definition 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2002.00118.x"},{"key":"e_1_3_2_1_27_1","unstructured":"Raymond E. S. The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary O'Reilly Beijing China 2001. Raymond E. S. The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary O'Reilly Beijing China 2001."},{"volume-title":"Workshop on Econ. and Info. Security","year":"2004","author":"Rescorla E.","key":"e_1_3_2_1_28_1"},{"volume-title":"Morgan Road Books","year":"2006","author":"Rubin A.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"journal-title":"J. The Myth of Open Source Security","year":"2000","author":"Viega","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.951496"},{"key":"e_1_3_2_1_33_1","first-page":"5","article-title":"See Past Self-Proclaimed Experts' Open-Source Security Evaluations","volume":"50","author":"Wolfe M","year":"2007","journal-title":"Comm. of the ACM"}],"event":{"name":"SAC09: The 2009 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Honolulu Hawaii","acronym":"SAC09"},"container-title":["Proceedings of the 2009 ACM symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1529282.1529731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T07:09:41Z","timestamp":1673334581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529282.1529731"}},"subtitle":["towards measuring security"],"short-title":[],"issued":{"date-parts":[[2009,3,8]]},"references-count":33,"alternative-id":["10.1145\/1529282.1529731","10.1145\/1529282"],"URL":"https:\/\/doi.org\/10.1145\/1529282.1529731","relation":{},"subject":[],"published":{"date-parts":[[2009,3,8]]},"assertion":[{"value":"2009-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}