{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T11:44:50Z","timestamp":1778413490525,"version":"3.51.4"},"reference-count":17,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEE Proc., Softw."],"published-print":{"date-parts":[[2002]]},"DOI":"10.1049\/ip-sen:20020208","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T11:11:29Z","timestamp":1027681889000},"page":"47","source":"Crossref","is-referenced-by-count":14,"title":["Trust and vulnerability in open source software"],"prefix":"10.1049","volume":"149","author":[{"given":"S.A.","family":"Hissam","sequence":"first","affiliation":[]},{"given":"D.","family":"Plakosh","sequence":"additional","affiliation":[]},{"given":"C.","family":"Weinstock","sequence":"additional","affiliation":[]}],"member":"265","reference":[{"key":"10.1049\/ip-sen:20020208_r1","unstructured":"President's Information Technology Advisory Committee PITAC, and co-chairs JOY, B., and Kennedy, K. (Eds.): `Report to the President, Information Technology Research: Investing in our Future'. http:\/\/www.ccic.gov\/ac\/report\/pitac_report.pdf (February 1999)"},{"key":"10.1049\/ip-sen:20020208_r2","unstructured":"Raymond, E.: The cathedral & the bazaar: musings on Linux and open source by an accidental revolutionary, (O'Reilly & Associates, Cambridge, MA 1999)"},{"key":"10.1049\/ip-sen:20020208_r3","unstructured":"Viega, J.: `The myth of open-source security'. http:\/\/webdeveloper.earthweb.com\/websecu\/article\/0,,12013_621851,00.html (June 2000)."},{"key":"10.1049\/ip-sen:20020208_r4","unstructured":"CERT Coordination Center.: `Number of incidents reported'. http:\/\/www.cert.org\/stats\/cert_stats.html#incidents (July 2001)"},{"key":"10.1049\/ip-sen:20020208_r5","unstructured":"Netcraft: `Netcraft web server survey'. http:\/\/www.netcraft.com\/survey (October 2001)"},{"key":"10.1049\/ip-sen:20020208_r6","unstructured":"Hissam, S.: Case study: correcting system failure in a COTS information system'. SEI Monographs on the Use of Commercial Software in Government Systems (monograph). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, October 1997. http:\/\/www.sei.cmu.edu\/cbs\/papers\/monographs\/case-study-correcting\/case.study.correcting.htm"},{"key":"10.1049\/ip-sen:20020208_r7","unstructured":"Neumann, P.: `Computer-related risks' (Addison-Wesley, Reading, MA, October 1995)."},{"key":"10.1049\/ip-sen:20020208_r8","unstructured":"Ellison, R., Fisher, D., Linger, R., Lipson, H., Longstaff, T., and Mead, N.: `Survivable network systems: an emerging discipline' (CMU\u2215SEI-97-TR-013, ADA341963, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, November 1997). http:\/\/www.sei.cmu.edu\/publications\/documents\/97.reports\/97tr013\/97tr013abstract.html"},{"key":"10.1049\/ip-sen:20020208_r9","unstructured":"Whitlock, N.: `Does open source mean an open door?' http:\/\/www-106.ibm.com\/developerworks\/linux\/library\/l-oss.html (2001)"},{"key":"10.1049\/ip-sen:20020208_r10","unstructured":"Thomas, B. (Ed.): `A discussion of open-source software.' SEI Interactive. http:\/\/interactive.sei.cmu.edu\/Features\/2000\/March\/Roundtable\/Roundtable.mar00.pdf (March 1990)"},{"key":"10.1049\/ip-sen:20020208_r11","unstructured":"CERT Coordination Center: `CERT\u00ae advisory CA-1999-14 multiple vulnerabilities in BIND'. http:\/\/www.cert.org\/advisories\/CA-1999-14.html (2001)"},{"key":"10.1049\/ip-sen:20020208_r12","unstructured":"DARPA: `Internet protocol, DARPA internet program protocol specification (RFC-791)'. Marina Del Ray, CA: Information Sciences Institute, University of Southern California, September 1981. ftp:\/\/ftp.isi.edu\/in-notes\/rfc791.txt"},{"key":"10.1049\/ip-sen:20020208_r13","unstructured":"Internet Security Systems, Inc.: `Teardrop IP fragmentation' http:\/\/xforce.iss.net\/static\/338.php (2001)"},{"key":"10.1049\/ip-sen:20020208_r14","unstructured":"CERT Coordination Center: `CERT\u00ae advisory CA-1997-28 IP denial-of-service attacks'. http:\/\/www.cert.org\/advisories\/CA-1997-28.html (2001)"},{"key":"10.1049\/ip-sen:20020208_r15","first-page":"58","author":"Feller","year":"2000","journal-title":"Proceedings of the International Conference on"},{"key":"10.1049\/ip-sen:20020208_r16","first-page":"41","author":"Nakakoji","year":"2001","journal-title":"Making sense of the bazaar: Proceedings of the 1st workshop on"},{"key":"10.1049\/ip-sen:20020208_r17","unstructured":"Asundi, J.: `Issues in software development: outsourcing, design and organization'. PhD Dissertation, School of Computer Science, Carnegie Mellon University, 2001"}],"container-title":["IEE Proceedings - Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/ip-sen_20020208?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T03:17:19Z","timestamp":1609471039000},"score":1,"resource":{"primary":{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/ip-sen_20020208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002]]}},"URL":"https:\/\/doi.org\/10.1049\/ip-sen:20020208","relation":{},"ISSN":["1462-5970"],"issn-type":[{"value":"1462-5970","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}