{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:26:14Z","timestamp":1761945974495,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540731009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73101-6_42","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T15:29:25Z","timestamp":1183390165000},"page":"226-230","source":"Crossref","is-referenced-by-count":15,"title":["Extreme Programming Security Practices"],"prefix":"10.1007","author":[{"given":"Xiaocheng","family":"Ge","sequence":"first","affiliation":[]},{"given":"Richard F.","family":"Paige","sequence":"additional","affiliation":[]},{"given":"Fiona","family":"Polack","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Brooke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Common criteria for information technology security evaluation, version 2.5. ISO\/IEC 18405 (2005)"},{"key":"42_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11774129_16","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"E.G. Aydal","year":"2006","unstructured":"Aydal, E.G., Paige, R.F., Chivers, H., Brooke, P.J.: Brooke. Security planning and refactoring in extreme programming. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, vol.\u00a04044, pp. 154\u2013163. Springer, Heidelberg (2006)"},{"key":"42_CR3","unstructured":"Baskerville, R.: Agile security for information warefare: a call for research. In: Proc. ECIS 2004, Turku, Finland (June 2004)"},{"key":"42_CR4","unstructured":"Beck, K., Andres, C.: Extreme Programming Explained: Embrace Change. 2nd edn., Addison-Wesley, Reading (November 2004)"},{"key":"42_CR5","unstructured":"Beznosov, K.: Extreme security engineering. In: Proc. BizSec Fairfax, VA (October 2003)"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/11499053_7","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"H. Chivers","year":"2005","unstructured":"Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol.\u00a03556, pp. 57\u201365. Springer, Heidelberg (2005)"},{"key":"42_CR7","unstructured":"Fowler, M.: Is design dead? (May 2004), http:\/\/www.martinfowler.com\/articles\/designDead.html"},{"key":"42_CR8","unstructured":"Graff, M., van Wyk, K.: Secure Coding, Principles, and Practices. O\u2019Reilly (2002)"},{"key":"42_CR9","volume-title":"J2EE Security for Servlets, EJBs, and Web Services","author":"P. Kumar","year":"2004","unstructured":"Kumar, P.: J2EE Security for Servlets, EJBs, and Web Services. Prentice Hall PTR, Englewood Cliffs (2004)"},{"key":"42_CR10","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"1997","unstructured":"Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice Hall, Englewood Cliffs (1997)","edition":"2"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Siponen, M., Baskerville, R., Kuivalainen, T.: Integrating security into agile development methods. In: Proc. 38th HICSS (2005)","DOI":"10.1109\/HICSS.2005.329"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Tracy, M., Jansen, W., McLamon, M.: Guidelines on securing public web servers. Technical report, NIST 800-44 (September 2002)","DOI":"10.6028\/NIST.SP.800-44"},{"key":"42_CR13","volume-title":"Building Secure Software","author":"J. Viega","year":"2002","unstructured":"Viega, J., McGraw, G.: Building Secure Software. Addison-Wesley, Reading (2002)"}],"container-title":["Lecture Notes in Computer Science","Agile Processes in Software Engineering and Extreme Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73101-6_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:12:03Z","timestamp":1605762723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73101-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540731009"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73101-6_42","relation":{},"subject":[]}}