{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:19Z","timestamp":1740099079848,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951645"},{"type":"electronic","value":"9783319951652"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95165-2_3","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T14:35:04Z","timestamp":1530628504000},"page":"34-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation Phase Methodology for the Development of Safe Code in the Information Systems of the Ministry of Housing, City, and\u00a0Territory"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2324-4054","authenticated-orcid":false,"given":"Rosa Mar\u00eda","family":"Nivia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1543-0954","authenticated-orcid":false,"given":"Pedro Enrique","family":"Cort\u00e9s","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0371-3925","authenticated-orcid":false,"given":"Alix E.","family":"Rojas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"3_CR1","unstructured":"Apple Computer Inc.: Secure Coding Guide (2016)"},{"key":"3_CR2","unstructured":"The Web Application Security Consortium: The WASC Threat Classification v2.0 (2011)"},{"key":"3_CR3","unstructured":"Standards, SEI CERT Coding: Obtenido de Software Engineering Institute - Carnegie Mellon University, 24 de abril de (2017)"},{"key":"3_CR4","unstructured":"Bijay, K., Jayaswal, P.C.: Design for Trustworyhy Software. Pearson (2007)"},{"key":"3_CR5","unstructured":"Brito, C. J.: Metodolog\u00edas para desarrollar software seguro (2013)"},{"key":"3_CR6","unstructured":"BSIMM Initiative: BSIMM Framework (2017)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"SANS: What Works in Application Security (2016)","DOI":"10.1016\/S1353-4858(16)30015-0"},{"key":"3_CR8","unstructured":"Curphey, Mark - OWASP: A Guide to Building Secure Web Applications - The Open Web Application Security Project (2005)"},{"key":"3_CR9","unstructured":"Deloitte: Encuesta de Seguridad Mundial. USA: Deloitte Survey (2007)"},{"key":"3_CR10","unstructured":"Williams, J. OWASP Foundation: The Open Web Application Security Project (2008)"},{"key":"3_CR11","unstructured":"Forero, R.A.: Dinero. Obtenido de Amenazas cibern\u00e9ticas y la vulnerabilidad de nuestro negocio (2016)"},{"key":"3_CR12","volume-title":"Building Quality Software","author":"RL Glass","year":"1992","unstructured":"Glass, R.L.: Building Quality Software. Prentice Hall, Upper Saddle River, New Jersey (1992)"},{"key":"3_CR13","first-page":"95","volume":"5","author":"NMA Munassar","year":"2010","unstructured":"Munassar, N.M.A., Govardhan, A.: A comparison between five models of software engineering. Int. J. Comput. Sci. Issues 5, 95\u2013101 (2010)","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"3_CR14","unstructured":"Microsoft Corporation: The Security Development Lifecycle Developer Starter Kit (2017)"},{"key":"3_CR15","volume-title":"The Security Development Lifecycle","author":"M Howard","year":"2006","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press a Division of Microsoft Corporation, Redmond (2006)"},{"key":"3_CR16","volume-title":"Innocent Code - A Security Wake-Up Call for Web Programmers","author":"SH Huseby","year":"2004","unstructured":"Huseby, S.H.: Innocent Code - A Security Wake-Up Call for Web Programmers. Wiley, London (2004)"},{"key":"3_CR17","unstructured":"International Organization for Standarization and International Electrotechnical Commission: ISO\/IEC 27034\u20131 Application Security - Overview and Concepts. ISO (2011)"},{"key":"3_CR18","unstructured":"ISO\/IEC, I.: ISO. ISO\/IEC 27001:2013 - Information technology - Security Techniques - Information security management systems. ISO\/IEC (2013)"},{"key":"3_CR19","volume-title":"Building Secure Software","author":"GM Jhohn Viega","year":"2001","unstructured":"Jhohn Viega, G.M.: Building Secure Software. Pearson, Indianapolis (2001)"},{"key":"3_CR20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-64r2","volume-title":"Security Considerations in the System Development Life Cycle","author":"R Kissel","year":"2008","unstructured":"Kissel, R.: Security Considerations in the System Development Life Cycle. NIST Special Publication, Technical report, National Institute of Standards and Technology (2008)"},{"key":"3_CR21","unstructured":"ISACA.: Encuesta de Fraude y Cibercrimen en Colombia. Bogota (2013)"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Florez, H., Sanchez, M., Villalobos, J.: A Catalog of Automated Analysis Methods for Enterprise Models. Springer, New York (2016). https:\/\/doi.org\/10.1186\/s40064-016-2032-9","DOI":"10.1186\/s40064-016-2032-9"},{"key":"3_CR23","volume-title":"Code Complete: A Practical Handbook of Software Construction","author":"S McConnel","year":"2004","unstructured":"McConnel, S.: Code Complete: A Practical Handbook of Software Construction, 2nd edn. Microsoft Press, Redmond (2004)","edition":"2"},{"key":"3_CR24","volume-title":"Software Security: Building Security in","author":"G McGraw","year":"2006","unstructured":"McGraw, G.: Software Security: Building Security in. Addison Wesley, Boston (2006)"},{"key":"3_CR25","unstructured":"Microsoft Corp.: Microsoft Security Development Lifecycle (SDL) - Process Guidance (2012)"},{"key":"3_CR26","unstructured":"Microsoft Corp.: Improving Web Application Security: Threats and Countermeasures (2017)"},{"key":"3_CR27","unstructured":"MINTIC: Conoce la estrategia de gobierno en l\u00ednea (2017)"},{"key":"3_CR28","unstructured":"Minvivienda: Misi\u00f3n y Visi\u00f3n del Ministerio de Vivienda (2017)"},{"key":"3_CR29","unstructured":"National Institute of Standards and Technology: Security Considerations in the System Development Life Cycle (2008)"},{"key":"3_CR30","unstructured":"OWASP Foundation: OWASP Secure Coding Practices - Quick Reference Guide (2015)"},{"key":"3_CR31","unstructured":"OWASP Foundation: The Open Web Application Security Project (2015)"},{"key":"3_CR32","unstructured":"OWASP Foundation: OWASP.NET Project (2016)"},{"key":"3_CR33","unstructured":"OWASP Foundation: OWASP SAMM Project (2017)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95165-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:57:01Z","timestamp":1604537821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95165-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951645","9783319951652"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95165-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}