2018
DOI: 10.1016/j.clsr.2017.11.003
|View full text |Cite
|
Sign up to set email alerts
|

From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter – RVDP): The Latvian approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 0 publications
0
8
0
2
Order By: Relevance
“…It always comes to a simple rule: the chain is as strong as its weakest link [67]. Of course, after finding flaws it is important to follow the procedure commonly known as "responsible disclosure" [68][69][70]. In short terms, the procedure states that no information regarding a security flaw should be published before respective vendors have been informed and fix or patched released.…”
Section: Legality and Ethics Of Conducted Researchmentioning
confidence: 99%
“…It always comes to a simple rule: the chain is as strong as its weakest link [67]. Of course, after finding flaws it is important to follow the procedure commonly known as "responsible disclosure" [68][69][70]. In short terms, the procedure states that no information regarding a security flaw should be published before respective vendors have been informed and fix or patched released.…”
Section: Legality and Ethics Of Conducted Researchmentioning
confidence: 99%
“…It always comes to a simple rule: the chain is as strong as its weakest link [58]. Of course, after finding flaws, it is important to follow the procedure commonly known as "responsible disclosure" [59][60][61]. In short terms, the procedure states that no information regarding a security flaw should be published before respective vendors were informed and fix or patch released.…”
Section: Legality and Ethics Of Conducted Researchmentioning
confidence: 99%
“…Bug bounties have become increasingly popular in recent years. As a testimony of the popularity, even the United States Department of Defense (DoD) recently piloted a bug bounty program, which further led to a partnership with a crowdsourcing bug bounty platform [8,10]. Despite of the popularity, bug bounties are surrounded by many unanswered and controversial questions.…”
Section: Introductionmentioning
confidence: 99%