Difference between revisions of "Student Projects:Most Secure Platform"
m (fixing typos) |
(→Students Project: Is Open Source really more Secure than IP?) |
||
Line 1: | Line 1: | ||
− | == | + | =='''Students Project: Is Open Source really more Secure than IP?'''== |
− | This group was initially started by [[User: | + | This group was initially started by [[User:mgammal|El-Gammal]] and [[User:Tolba|Tolba]] seeking other colleagues with similar project interests. Close proximity to the Seattle area is desired for easier meetings and collaboration. |
===Member List=== | ===Member List=== | ||
[[User:Tolba|Tolba]]<br> | [[User:Tolba|Tolba]]<br> | ||
− | [[User: | + | [[User:mgammal|El-Gammal]] |
− | |||
− | |||
− | + | ===Project Goals=== | |
− | + | ||
+ | At the heart of the claim of open source software inherit security over commercial software is Eric Raymond’s maxim that “Given enough eyeballs all bugs are shallow”. This project will take a closer look at the data to support or disprove the validity of this line of reasoning, investigate the effects of having the source code available for both the attacker and defender in both open source and commercial software and the claim of commercial software providers that open source software suffers from lack of accountability in dealing with security vulnerabilities. We will also investigate how software security impacted the procurement decision making process in large corporations and government agencies. |
Revision as of 07:28, 23 October 2004
Students Project: Is Open Source really more Secure than IP?
This group was initially started by El-Gammal and Tolba seeking other colleagues with similar project interests. Close proximity to the Seattle area is desired for easier meetings and collaboration.
Member List
Project Goals
At the heart of the claim of open source software inherit security over commercial software is Eric Raymond’s maxim that “Given enough eyeballs all bugs are shallow”. This project will take a closer look at the data to support or disprove the validity of this line of reasoning, investigate the effects of having the source code available for both the attacker and defender in both open source and commercial software and the claim of commercial software providers that open source software suffers from lack of accountability in dealing with security vulnerabilities. We will also investigate how software security impacted the procurement decision making process in large corporations and government agencies.