A Data Engineering Method for Filtering and Identifying Open Source Software Supply Chain

  • Lou Zehua*
  • , Liang Guan-Yu
  • , Wu Yan-Jun
  • , Wu Bin
  • , Wu Songlin
  • , Sun Qing
  • , Wang Wei
  • , Tian Chunqi
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Filtering and identifying open source supply chain software are the front conditions for the security of the software supply chain, and it is a necessary means to help users and enterprises choose reliable softwares. At the same time, identifying the supply chain of the entire ecology is a vital way to explore the ecological characteristics and find hidden dangers. By tracing the development history of external dependencies in different programming language management, this article summarizes the four common external dependencies management methods today and proposes a universal open source software supply chain construction algorithm. Finally, the Linux distribution version is used as a case of large software systems, and its supply chain is analyzed.

Original languageEnglish
Title of host publication2023 IEEE 8th International Conference on Big Data Analytics, ICBDA 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages205-214
Number of pages10
ISBN (Electronic)9798350310764
DOIs
StatePublished - 2023
Event8th IEEE International Conference on Big Data Analytics, ICBDA 2023 - Virtual, Online, China
Duration: 3 Mar 20235 Mar 2023

Publication series

Name2023 IEEE 8th International Conference on Big Data Analytics, ICBDA 2023

Conference

Conference8th IEEE International Conference on Big Data Analytics, ICBDA 2023
Country/TerritoryChina
CityVirtual, Online
Period3/03/235/03/23

Keywords

  • code dependency relationship
  • open source sofnvare supply chain
  • package manager

Fingerprint

Dive into the research topics of 'A Data Engineering Method for Filtering and Identifying Open Source Software Supply Chain'. Together they form a unique fingerprint.

Cite this