{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T06:10:03Z","timestamp":1736835003478,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387348254"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-34827-8_3","type":"book-chapter","created":{"date-parts":[[2007,1,25]],"date-time":"2007-01-25T17:29:09Z","timestamp":1169746149000},"page":"27-39","source":"Crossref","is-referenced-by-count":0,"title":["The risks analysis like a practice of secure software development. A revision of models and methodologies"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Carrillo","family":"Verd\u00fan","sequence":"first","affiliation":[]},{"given":"Gloria Gasca","family":"Hurtado","sequence":"additional","affiliation":[]},{"given":"Edmundo Tovar","family":"Caro","sequence":"additional","affiliation":[]},{"given":"Vianca Vega","family":"Zepeda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2004.21","volume":"2","author":"N. Davis","year":"2004","unstructured":"N. Davis, W. Humphrey, S. Redwine, G. Zibulski, and G. McGraw, \u201cProcesses for producing secure software,\u201d Security & Privacy Magazine IEEE, vol. 2, pp. 18\u201325 2004.","journal-title":"Security & Privacy Magazine IEEE"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"G. McGraw, \u201cSoftware Security,\u201d IEEE Security & Privacity, pp. 80\u201383, 2004.","DOI":"10.1109\/MSECP.2004.1281254"},{"key":"3_CR3","unstructured":"B. R., \u201cThe Risks to System Quality Investing in Software Testing Series, Part 3.\u201d"},{"key":"3_CR4","unstructured":"I. Sommerville, \u201cIngenier\u00eda de Software,\u201d P. Education, Ed., 6 ed. M\u00e9xico, 2002."},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2004.55","volume":"2","author":"D. M. Verdon","year":"2004","unstructured":"D. M. Verdon, G., \u201cRisk analysis in software design,\u201d IEEESecurity & Privacy Magazine, vol. 2, pp. 79\u201384, 2004.","journal-title":"IEEESecurity & Privacy Magazine"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSECP.2003.1193213","volume":"1","author":"G. McGraw","year":"2003","unstructured":"G. McGraw, \u201cFrom the ground up: the DIMACS software security workshop,\u201d IEEE Security & Privacy Magazine, vol. 1, pp. 59\u201366, 2003.","journal-title":"IEEE Security & Privacy Magazine"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2004.84","volume":"2","author":"B. M. Potter","year":"2004","unstructured":"B. M. Potter, G., \u201cSoftware security testing,\u201d IEEESecurity & Privacy Magazine, vol. 2, pp. 81\u201385, 2004.","journal-title":"IEEESecurity & Privacy Magazine"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/52.922730","volume":"19","author":"J. A. Whittaker","year":"2001","unstructured":"J. A. Whittaker, \u201cSoftware\u2019s invisible users,\u201d IEEE Software, vol. 19, pp. 84\u201388, 2001.","journal-title":"IEEE Software"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/777313.777315","volume":"46","author":"H. W. a. C. Wang","year":"2003","unstructured":"H. W. a. C. Wang, \u201cTaxonomy of security considerations and software quality,\u201d Communications of the ACM, vol. 46, pp. 75\u201378, 2003.","journal-title":"Communications of the ACM"},{"key":"3_CR10","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2005.118","volume":"3","author":"K. R. M. Wyk Van","year":"2005","unstructured":"K. R. M. Van Wyk, G., \u201cBridging the gap between software development and information security,\u201d Security & Privacy Magazine IEEE, vol. 3, pp. 75\u201379, 2005.","journal-title":"Security & Privacy Magazine IEEE"},{"key":"3_CR11","unstructured":"G. E. McGraw, \u201cRisk Management Framework (RMF),\u201d Cigital, Inc., 2005."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"C. Alberts, Dorofee, A., Stevens, J., Woody, C, \u201cIntroduction to the OCTAVE Approach,\u201d vol. Software Engineering Institute, 2003.","DOI":"10.21236\/ADA634134"},{"key":"3_CR13","unstructured":"C. Alberts and A. Dorofee, Managing Information Security Risk. The OCTAVE Approach: Addison Wesley, 2005."},{"key":"3_CR14","unstructured":"J. Ma\u00f1as, \u201cPilar. Herramientas para el An\u00e1lisis y la Gesti\u00f3n de Riesgos,\u201d 2004."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"D. P. P. Gilliam, J.D.; Kelly, J.C.; Bishop, M.;, \u201cReducing software security risk through an integrated approach,\u201d Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard, pp. 36\u201342 2001.","DOI":"10.1109\/SEW.2001.992653"},{"key":"3_CR16","unstructured":"H., Failure Mode and Effect Analysis. FMEA from Theory to Execution, Second Edition ed."}],"container-title":["IFIP International Federation for Information Processing","Network Control and Engineering for Qos, Security and Mobility, V"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-34827-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T06:08:59Z","timestamp":1736748539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-34827-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387348254"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-34827-8_3","relation":{},"subject":[]}}