Uneingeschränkter Zugang

Auditing Community Software Development


Zitieren

[1] Critical infrastructure, 2015. <http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-terrorism/critical-infrastructure/index_en.htm>Search in Google Scholar

[2] Bognár Balázs:A létfontosságú rendszerelemek azonosításának, kijelölésének folyamata, az LRL IBEK működésének eddigi eredményei, a BM OKF elvárásai az NKE képzésével kapcsolatban, [2015-05-12] <http://vtki.uni-nke.hu-downloads/tk/IBOT_PILOT/PLENARIS/Dr_Bognar_Balazs.pdf>Search in Google Scholar

[3] Haig Zsolt:Információ – társadalom – biztonság, Budapest: s.n., 2015. ISBN 978-615-5527-08-1.Search in Google Scholar

[4] Donald Feinberg, Merv Adrian: The State of Open-Source RDBMSs, 2015. <http://www.gartner.com/technology-reprints.do?id=1-2DTR05J&ct=150421&st=sb>Search in Google Scholar

[5] Mészáros Gergely: Security impacts of community based software development. In: CEE e|Dem and e|Gov Days 2015. 2015: 2015. ISBN 978-2-85403-308-0.Search in Google Scholar

[6] Policy on Critical Information Infrastructure Protection (CIIP), 2013. [2015-06-02] <http://ec.europa.eu/digital-agenda/en/news/policy-critical-information-infrastructure-protection-ciip>Search in Google Scholar

[7] Javier Lopez, Roberto Setola, Stephen D. Wolthusen: Overview of critical information infrastructure protection. In Critical Infrastructure Protection. Springer, 2012. pp. 1–14. ISBN 978-3-642-28919-4.10.1007/978-3-642-28920-0_1Search in Google Scholar

[8] ICCP Committee: OECD Recommendation of the Council on the Protection of Critical Information Infrastructures, 2008. OECD Council. <http://www.oecd.org/sti/40825404.pdf>Search in Google Scholar

[9] GovCERT-Hungary. [2015-06-08] <http://www.cert-hungary.hu/node/1>Search in Google Scholar

[10] Sean Barnum:Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX). 2013.Search in Google Scholar

[11] The MITRE Corporation: Open Source Software. 2013. [2015-06-04] <http://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/engineering-informationintensive-enterprises/open-source-software>Search in Google Scholar

[12] Phil Marshall:OSS GovernmentManagement using COBIT 5. 2012. [2015-05-23] <https://www.isaca.org/Education-Online-Learning/Documents/OSS-Government-Management-using-COBIT-5.pdf>Search in Google Scholar

[13] Jai Vijayan:Growing Open Source Use Heightens Enterprise Security Risks - Dark Reading. 2015jan. [2015-06-03] <http://www.darkreading.com/growing-open-source-use-heightens-enterprise-security-risks-/d/d-id/1318767>Search in Google Scholar

[14] J. Jang, A. Agrawal, D. Brumley: ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. . IEEE, 2012. pp. 48–62. [2015-05-06] ISBN 978-1-4673-1244-8, 978-0-7695-4681-0. <http://ieeexplore.ieee.org/lpdocsepic03/wrapper.htm?arnumber=6234404>Search in Google Scholar

[15] D. Brumley, P. Poosankam, D. Song, J. Zheng: Automatic patch-based exploit generation is possible: Techniques and implications. In: Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008. pp. 143–157. [2015-05-06] <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4531150> Hogyan lehet automatikusan meghatározni a sérülékenységet a patch elemzésével.10.1109/SP.2008.17Search in Google Scholar

[16] I. Herraiz, D. Izquierdo-Cortazar, F. Rivas-Hernández, J. Gonzalez-Barahona, G. Robles, S. Duenas-Dominguez, C. Garcia-Campos, J.F. Gato, L. Tovar: Flossmetrics: Free/libre/open source software metrics. In Software Maintenance and Reengineering, 2009. CSMR’09. 13th EuropeanConference on. EEE, 2009. pp. 281–284. [2015-06-03] <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4812771>10.1109/CSMR.2009.43Search in Google Scholar

[17] A. Mathur, H. Choudhary, P. Vashist, W. Thies, S. Thilagam: An Empirical Study of License Violations in Open Source Projects. In: Software Engineering Workshop (SEW), 2012 35th Annual IEEE. IEEE, 2012. pp. 168–176. [2015-06-08] <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6479814>10.1109/SEW.2012.24Search in Google Scholar

[18] SANS Institute: Security Concerns in Using Open Source Software for Enterprise Requirements. 2003.Search in Google Scholar

[19] Robert Mcmillan:How Heartbleed Broke the Internet — And Why It Can Happen Again. [2014-04-14] <http://www.wired.com/2014/04/heartbleedslesson/>Search in Google Scholar

[20] Jack Wallen:From underfunded to funded within a heartbleed. 2014. [2015-05-20] <http://www.techrepublic.com-article/from-underfunded-to-funded-within-a-heartbleed/>Search in Google Scholar

[21] T.M. Harrison, S. Guerrero, G.B. Burke, M. Cook, A. Cresswell, N. Helbig, J. Hrdinová, T. Pardo: Open government and e-government: Democratic challenges from a public value perspective. In: Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. ACM, 2011. pp. 245–253. [2015-06-08] <http://dl.acm.org/citation.cfm?id=2037597>10.1145/2037556.2037597Search in Google Scholar

[22] Alexis O’Connor, Kian Win Ong, Ted Sander, Matt Ferlo:Government Policies on Open Source. 2010. <http://www.cs.washington.edu/education/courses/csep590/04au/clearedprojects/Ferlo.pdf>Search in Google Scholar

eISSN:
2064-2520
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere, Elektrotechnik, Automatisierungstechnik, Mess-, Steuer- und Regelungstechnik