CSC 379 SUM2008:Week 5, Group 2: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 20: Line 20:
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.

Revision as of 22:40, 8 August 2008

Open Non-Proprietary Technology vs. Closed Proprietary Technology

The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology. On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code. On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them. What bearing does this discussion have on other types of software systems? Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?

Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll). What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications? Are there applications where one or the other should clearly be used? Are there applications for which neither is appropriate? Please explain your answers.

Introduction

Proprietary Systems

Advantages

Disadvantages

Open Source System

Advantages

Disadvantages

Resources