{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:31:28Z","timestamp":1743143488830,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_1","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"3-15","source":"Crossref","is-referenced-by-count":2,"title":["Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile"],"prefix":"10.1007","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Katarzyna","family":"\u0141ukasiewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"1_CR1","unstructured":"Microsoft Security Development Lifecycle (SDL). \nhttps:\/\/www.microsoft.com\/en-us\/sdl\/"},{"key":"1_CR2","unstructured":"Building Security in Maturity Model (BSIMM). \nhttps:\/\/www.bsimm.com\/"},{"key":"1_CR3","unstructured":"ISO\/IEC 27034 series Application security. \nhttp:\/\/www.iso27001security.com\/html\/27034.html"},{"key":"1_CR4","unstructured":"IEC 62443-4-1 4-1: Secure product development life-cycle requirements"},{"key":"1_CR5","unstructured":"Manifesto for Agile Software Development. \nhttp:\/\/agilemanifesto.org"},{"key":"1_CR6","volume-title":"Agile Software Development with Scrum","author":"K Schwaber","year":"2002","unstructured":"Schwaber, K., Beedle, M.: Agile Software Development with Scrum. Prentice Hall, Upper Saddle River (2002)"},{"key":"1_CR7","volume-title":"Extreme Programming Explained","author":"K Beck","year":"2004","unstructured":"Beck, K., Andres, C.: Extreme Programming Explained. Addison-Wesley Professional, Boston (2004)"},{"key":"1_CR8","unstructured":"Knaster, R., Leffingwell, D.: SAFe Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering. Addison-Wesley Professional (2017)"},{"key":"1_CR9","unstructured":"Scrum of Scrums | Agile Alliance. \nhttps:\/\/www.agilealliance.org\/glossary\/scrum-of-scrums\/"},{"key":"1_CR10","unstructured":"Kim, G., Willis, J., Debois, P., Humble, J., Allspaw, J.: The DevOps Handbook. Trade Select (2016)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-540-87698-4_6","volume-title":"Computer Safety, Reliability, and Security","author":"RF Paige","year":"2008","unstructured":"Paige, R.F., Charalambous, R., Ge, X., Brooke, P.J.: Towards agile engineering of high-integrity systems. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 30\u201343. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-87698-4_6"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Rasmussen, R., Hughes, T., Jenks, J., Skach, J.: Adopting agile in an FDA regulated environment. In: Proceedings of the 2009 Agile Conference, pp. 151\u2013155 (2009)","DOI":"10.1109\/AGILE.2009.50"},{"key":"1_CR13","first-page":"190","volume":"477","author":"M McHugh","year":"2014","unstructured":"McHugh, M., McCaffery, F., Coady, G.: An agile implementation within a medical device software organisation. Commun. Comput. Inf. Sci. 477, 190\u2013201 (2014)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"1_CR14","unstructured":"Myklebust, T., St\u00e5lhane, T., Hanssen, G.: Use of agile practices when developing safety-critical software. In: Proceeding of International System Safety Conference (2016)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"\u0141ukasiewicz, K., G\u00f3rski, J.: AgileSafe \u2013 a method of introducing agile practices into safety-critical software development processes. In: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (2016)","DOI":"10.15439\/2016F360"},{"key":"1_CR16","unstructured":"Ambler, S.: IBM agility@scale\u2122: Become as Agile as You Can Be. IBM (2010)"},{"key":"1_CR17","unstructured":"Ambler, S.: Agility at Scale: Results from the Summer 2012 DDJ State of the IT Union Survey. \nhttp:\/\/www.ambysoft.com\/surveys\/stateOfITUnion201209.html"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Bostr\u00f6m, G., W\u00e4yrynen, J., Bod\u00e9n, M., Beznosov, K., Kruchten, P.: Extending XP practices to support security requirements engineering. In: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems - SESS 2006, pp. 11\u201318 (2006)","DOI":"10.1145\/1137627.1137631"},{"key":"1_CR19","unstructured":"ISO\/IEC 15026 Systems and software engineering \u2013 Systems and software assurance"},{"key":"1_CR20","unstructured":"NOR-STA tool. \nwww.argevide.com"},{"key":"1_CR21","unstructured":"Weinstock, C., Goodenough, J.: Towards an assurance case practice for medical devices. Technical Note Software Engineering Institute (2009)"},{"key":"1_CR22","unstructured":"FDA: Guidance \u2013 Total Product Life Cycle: Infusion Pump-Premarket Notification Submissions [510 (k)] (2010)"},{"key":"1_CR23","unstructured":"Weinstock, C.B., Lipson, H.F., Goodenough J.: Arguing security \u2013 creating security assurance cases. In: Software Engineering Institute Report (2007). \nhttp:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2013_019_001_293637.pdf"},{"key":"1_CR24","unstructured":"Weinstock, C.B, Lipson, H.F.: Evidence of assurance: laying the foundation for a credible security case. In: Software Engineering Institute Report (2013), \nhttps:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2013_019_001_295685.pdf"},{"key":"1_CR25","unstructured":"Alexander, R., Hawkins, R., Kelly, T.: Security assurance cases: motivation and the state of the art. In: University of York Report Number: CESG\/TR\/2011\/1 (2011)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Finnegan, A., McCaffery, F.: A Security argument pattern for medical device assurance cases. In: 2014 IEEE International Symposium on Software Reliability Engineering Workshops (2014)","DOI":"10.1109\/ISSREW.2014.89"},{"key":"1_CR27","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MDAT.2015.2468222","volume":"32","author":"A Ray","year":"2015","unstructured":"Ray, A., Cleaveland, R.: Security assurance cases for medical cyber and physical systems. IEEE Des. Test 32, 56\u201365 (2015)","journal-title":"IEEE Des. Test"},{"key":"1_CR28","unstructured":"Bright Inventions. \nhttp:\/\/brightinventions.pl\/"},{"key":"1_CR29","unstructured":"iBeacon - Apple Developer. \nhttps:\/\/developer.apple.com\/ibeacon\/"},{"key":"1_CR30","unstructured":"\u0141ukasiewicz, K.: Method of selecting programming practices for the safety-critical software development projects \u2013 a case study. Technical report n. 02\/2017. Gda\u0144sk University of Technology (2017)"},{"key":"1_CR31","unstructured":"Your heart rate. What it means, and where on Apple Watch you\u2019ll find it. \nhttps:\/\/support.apple.com\/en-us\/HT204666"},{"key":"1_CR32","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"L Cyra","year":"2011","unstructured":"Cyra, L., G\u00f3rski, J.: Support for argument structures review and assessment. Reliab. Eng. Syst. Safety 96, 26\u201337 (2011)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"1_CR33","unstructured":"Stalhane, T., Hanssen, G., Myklebust, T.: The Application of SafeScrum to IEC 61508 certifiable Software, January 2014"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T14:23:04Z","timestamp":1502202184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}