{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:41:39Z","timestamp":1743025299137,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031409776"},{"type":"electronic","value":"9783031409783"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40978-3_39","type":"book-chapter","created":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T05:01:33Z","timestamp":1692766893000},"page":"361-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method for Promoting the Introduction of DevSecOps to Improve Security Quality"],"prefix":"10.1007","author":[{"given":"Shigeaki","family":"Tanimoto","sequence":"first","affiliation":[]},{"given":"Yusuke","family":"Okuwaki","sequence":"additional","affiliation":[]},{"given":"Kazuhiko","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Tsutomu","family":"Kounosu","sequence":"additional","affiliation":[]},{"given":"Hironori","family":"Takuma","sequence":"additional","affiliation":[]},{"given":"Masao","family":"Toyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"key":"39_CR1","unstructured":"Doors DX Media: \u201cDevSecOps Days Tokyo\u201d Report (1), https:\/\/www.brainpad.co.jp\/doors\/feature\/devsecops_report_1\/ (2021). (in Japanese)"},{"key":"39_CR2","unstructured":"Information-technology Promotion Agency, Japan (IPA), Basics of CC (ISO15408). https:\/\/www.ipa.go.jp\/security\/jisec\/seminar\/ps6vr7000000qsq5-att\/cc_20060222.pdf (2006). (in Japanese)"},{"key":"39_CR3","unstructured":"IBM, What is DevSecOps ? https:\/\/www.ibm.com\/jp-ja\/topics\/devsecops (in Japanese)"},{"key":"39_CR4","unstructured":"T. Kaneko, Introduction to Security by Design, IPA. https:\/\/www.ipa.go.jp\/files\/000055823.pdf (2016). (in Japanese)"},{"key":"39_CR5","unstructured":"Google Cloud, DevOps Capability. https:\/\/cloud.google.com\/architecture\/devops\/capabilities. (in Japanese)"},{"key":"39_CR6","unstructured":"Doors DX Media, \u201cDevSecOps Days Tokyo\u201d Report (3), 2021. https:\/\/www.brainpad.co.jp\/doors\/feature\/devsecops_report_3-1\/ (in Japanese),"},{"key":"39_CR7","unstructured":"IT Dictionary, Common Criteria \/ ISO\/IEC 15408. https:\/\/onl.tw\/cGGvKsYd. (in Japanese)"},{"key":"39_CR8","unstructured":"Information-technology Promotion Agency, Japan (IPA), Overview of CC (ISO\/IEC 15408). https:\/\/www.ipa.go.jp\/security\/jisec\/about_cc.html (2008). (in Japanese)"},{"key":"39_CR9","unstructured":"NISC, Measures to ensure information security from the planning and design stages (SBD (Security by Design)). https:\/\/www.nisc.go.jp\/active\/general\/pdf\/SBD_overview.pdf (in Japanese)"},{"key":"39_CR10","unstructured":"CyberSecurity.com, What is Security by Design? A thorough explanation of its necessity, benefits, and precautions. https:\/\/cybersecurity-jp.com\/security-measures\/29134 (2020). (in Japanese)"},{"key":"39_CR11","unstructured":"TECH+, 5 Issues impeding the shift to DevSecOps and how to solve them. https:\/\/news.mynavi.jp\/techplus\/kikaku\/20211207-2208996\/ (in Japanese)"},{"key":"39_CR12","unstructured":"Synopsys: DevSecOps has moved from a consideration to an essential issue. https:\/\/www.synopsys.com\/blogs\/software-security\/ja-jp\/gartner-critical-capabilities-appsec-devsecops\/ (2022). (in Japanese)"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"106894","DOI":"10.1016\/j.infsof.2022.106894","volume":"147","author":"MA Akbar","year":"2022","unstructured":"Akbar, M.A., et al.: Toward successful DevSecOps in software development organizations: a decision-making framework. Inform. Softw. Technol. 147, 106894 (2022)","journal-title":"Inform. Softw. Technol."},{"issue":"11","key":"39_CR14","first-page":"p20","volume":"17","author":"S Jeganathan","year":"2019","unstructured":"Jeganathan, S.: DevSecOps: a systemic approach for secure software development. ISSA J. 17(11), p20-27 (2019)","journal-title":"ISSA J."},{"key":"39_CR15","doi-asserted-by":"publisher","unstructured":"Efendi, M., et al.: DevSecOps approach in software development case study: public company logistic agency. In: International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS) (2021). https:\/\/doi.org\/10.1109\/ICIMCIS53775.2021.9699316","DOI":"10.1109\/ICIMCIS53775.2021.9699316"},{"key":"39_CR16","doi-asserted-by":"publisher","unstructured":"Ahmed, Z., et al.: Integrating security with DevSecOps: techniques and challenges. In: 2019 International Conference on Digitization (ICD). https:\/\/doi.org\/10.1109\/ICD47981.2019.9105789","DOI":"10.1109\/ICD47981.2019.9105789"},{"key":"39_CR17","unstructured":"Ahmed, A.: DevSecOps: Enabling Security by Design in Rapid Software Development, - 2019 - studenttheses.uu.nl, https:\/\/studenttheses.uu.nl\/handle\/20.500.12932\/31896"},{"key":"39_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-29608-7_7","volume-title":"Information Systems: Research, Development, Applications, Education: 12th SIGSAND\/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings","author":"L Prates","year":"2019","unstructured":"Prates, L., Faustino, J., Silva, M., Pereira, R.: DevSecOps Metrics. In: Wrycza, S., Ma\u015blankowski, J. (eds.) Information Systems: Research, Development, Applications, Education: 12th SIGSAND\/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings, pp. 77\u201390. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29608-7_7"},{"key":"39_CR19","doi-asserted-by":"publisher","unstructured":"Andre Morales, J., et al.: Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. In: ARES\u201820: Proceedings of the 15th International Conference on Availability, Reliability and Security, Article No.: 63, pp. 1\u20138 (2020). https:\/\/doi.org\/10.1145\/3407023.3409186","DOI":"10.1145\/3407023.3409186"},{"key":"39_CR20","unstructured":"Rahul, B.S., et al.: Implementation of DevSecOps using open-source tools. Int. J. Adv. Res., Ideas Innov. Technol. 5(3), 1050\u20131051. www.ijariit.com"},{"issue":"2","key":"39_CR21","first-page":"15","volume":"16","author":"A Shimoda","year":"2014","unstructured":"Shimoda, A., et al.: Software development PBL in university. J. Soc. Project Manag. 16(2), 15\u201320 (2014). (in Japanese)","journal-title":"J. Soc. Project Manag."},{"key":"39_CR22","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 2: Security functional components. https:\/\/commoncriteriaportal.org\/files\/ccfiles\/CCPART2V3.1R5.pdf (2017)"},{"key":"39_CR23","unstructured":"Kaneko, H.: Security and Computers, Security Assurance and Evaluation, Citizen's Lecture Series 2009, National Institute of Informatics. https:\/\/www.nii.ac.jp\/userdata\/shimin\/documents\/H21\/090611_1stlec02.pdf (in Japanese)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40978-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T05:06:00Z","timestamp":1692767160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40978-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409776","9783031409783"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40978-3_39","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai University","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}