Open-source versus proprietary software: Is one more reliable and secure than the other?

A Boulanger - IBM Systems Journal, 2005 - ieeexplore.ieee.org
… by the volunteer community in the form of mailing lists and Web sites. Currently, however, …
alteration and (2) the Journal reference and IBM copyright notice are included on the first page. …

IBM seeks to improve e-mail security

K Chapman - Network World Canada, 1999 - search.proquest.com
… Hoffman and IBM's Palmer agree on Secure Mailer's superior … "The idea with Secure Mailer
is we're reducing that door to … 12 small programs that comprise Secure Mailer is granted the …

[PDF][PDF] When worlds collide: information sharing for the security and anti-virus communities

S Gordon, R Ford - IBM research paper, 1999 - Citeseer
… positions of the Information Security professionals who actually use the mailing lists to help
… will be found spreading In the Wild, do you still want it published on security mailing lists?” …

[引用][C] IBM's secure mailer

K Dent - Sys Admin, 1999 - dl.acm.org
IBM's secure mailer | Sys Admin … IBM's secure mailerIBM's secure mailer

Why cryptosystems fail

R Anderson - … on Computer and Communications Security, 1993 - dl.acm.org
secure postal deliveries; and that most of the new students open bank accounts at the start of
the academic year in October, when large numbers of cards and PIN mailersIBM's security

[PDF][PDF] The evolution of cross site scripting attacks

D Endler - 2002 - docs.gnet0.com
… stream of announcements on security mailing lists. There must be a conscious effort on
the part of developers and vendors to understand this security issue and provide responsible …

[PDF][PDF] Putting private and government CERT's to the test

S Frei, M May - 20th Annual FIRST Conference, 2008 - researchgate.net
IBM ISS offers a range of security products and services, namely Managed … [6] security
mailing list. FullDisclosure is an unmoderated high-traffic forum for the disclosure of security

Modeling the security ecosystem-the dynamics of (in) security

S Frei, D Schatzmann, B Plattner… - … of Information Security and …, 2010 - Springer
… The discoverer publishes information about the vulnerability on a suitable channel (eg in
a security conference or on a security mailing list4). Following Path (C), the vulnerability …

Transaction security system extensions to the common cryptographic architecture

DB Johnson, GM Dolan - IBM systems journal, 1991 - ieeexplore.ieee.org
… of the Transaction Security System may be daunting for a first-time user. For many IBM customers,
… site to support remote PIN mailer creation. This service is a product-specific extension. …

[引用][C] IBM and Novell: Investing in an Open Source Future

C Jennings, A Persohn, L Uhlemeyer - 2004