Timing the Application of Security Patches for Optimal Uptime
LISA '02 Proceedings of the 16th USENIX conference on System administration
SMEs and Cybersecurity Threats in E-Commerce
The EDP Audit, Control, and Security Newsletter
An implementation of the Linux software repository model for other operating systems
Proceedings of the 2nd International Workshop on Hot Topics in Software Upgrades
An ontology-based approach to react to network attacks
International Journal of Information and Computer Security
Managing application whitelists in trusted distributed systems
Future Generation Computer Systems
SAPA: software agents for prevention and auditing of security faults in networked systems
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Modeling of policy-based network with SVDB
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Hi-index | 4.10 |
Most organizations recognize the importance of cyber security and are implementing various forms of protection. However, many are failing to find and fix known security problems in the software packages they use as the building blocks of their networks and systems, a vulnerability that a hacker can exploit to by-pass all other efforts to secure the enterprise. The Common Vulnerabilities and Exposures initiative seeks to avoid such disasters and transform this area from a liability to a key asset in the fight to build and maintain secure systems. Coordinating international, community-based efforts from industry, government, and academia, CVE strives to find and fix software product vulnerabilities more rapidly, predictably, and efficiently. The initiative seeks the adoption of a common naming practice for describing software vulnerabilities. Once adopted, these names will be included within security tools and services and on the fix sites of commercial and open source software package providers. As vendors respond to more user requests for CVE-compatible fix sites, securing the enterprise will gradually include the complete cycle of finding, analyzing, and fixing vulnerabilities.