{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:35:42Z","timestamp":1725557742556},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143465"},{"type":"electronic","value":"9783642143472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14347-2_17","type":"book-chapter","created":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T00:11:27Z","timestamp":1277079087000},"page":"188-199","source":"Crossref","is-referenced-by-count":0,"title":["An Automatic Approach to Aid Process Integration within a Secure Software Processes Family"],"prefix":"10.1007","author":[{"given":"Jia-kuan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Ya-sha","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Taylor, D., McGraw, G.: Adopting a software security improvement program. IEEE Security & Privacy (2005)","key":"17_CR1","DOI":"10.1109\/MSP.2005.60"},{"doi-asserted-by":"crossref","unstructured":"Byer, D., Shahmehri, N.: Design of a Process for Software Security. In: International Conference on Availability, Reliability and Security (2007)","key":"17_CR2","DOI":"10.1109\/ARES.2007.67"},{"unstructured":"lightweight application security process, http:\/\/www.owasp.org","key":"17_CR3"},{"key":"17_CR4","volume-title":"The Security Development Lifecycle (SDL): A Process for Developing Demonstrably More Secure Software","author":"L. Steve","year":"2006","unstructured":"Steve, L., Michael, H.: The Security Development Lifecycle (SDL): A Process for Developing Demonstrably More Secure Software. Microsoft Press, Redmond (2006)"},{"key":"17_CR5","volume-title":"Software Security: Building Security","author":"M. Gary","year":"2006","unstructured":"Gary, M.: Software Security: Building Security. Addison Wesley, Reading (2006)"},{"doi-asserted-by":"crossref","unstructured":"Mead, N.R., Houg, E.D., Stehney, T.R.: Security Quality Requirements Engineering (Square) Methodology. Software Eng. Inst., Carnegie Mellon Univ. (2005)","key":"17_CR6","DOI":"10.21236\/ADA443493"},{"doi-asserted-by":"crossref","unstructured":"Bostr\u00f6m., G., et al.: Extending XP Practices to Support Security Requirements Engineering. In: International Workshop Software Eng. for Secure Systems, SESS (2006)","key":"17_CR7","DOI":"10.1145\/1137627.1137631"},{"doi-asserted-by":"crossref","unstructured":"Bart, R.S., Koen, D., Johan, B., Wouter, G.: On the secure software development process: CLASP, SDL and Touchpoints compared. Information and Software Technology, 1152\u20131171 (2008)","key":"17_CR8","DOI":"10.1016\/j.infsof.2008.01.010"},{"unstructured":"Simidchieva, B.I., Clarke. L.A., Osterweil, L.J.: Representing Process Variation with a Process Family. In: International Conference on Software Process (2007)","key":"17_CR9"},{"unstructured":"Sutton, S.M., Osterweil, L.J.: Product families and process families. In: Software Process Workshop (1996)","key":"17_CR10"},{"unstructured":"Buyens, J.G.K., Win, B.D., Scandariato, R., Joosen, W.: Similarities and differences between CLASP, SDL, and Touchpoints: the activity-matrix, K.U. Leuven, Department of Computer Science (2007)","key":"17_CR11"},{"key":"17_CR12","volume-title":"Process Patterns: Building Large-Scale Systems using Object technology","author":"S.W. Ambler","year":"1998","unstructured":"Ambler, S.W.: Process Patterns: Building Large-Scale Systems using Object technology. SIGS Books\/Cambridge University Press, New York (1998)"},{"doi-asserted-by":"crossref","unstructured":"Land, I.C.R., Larsson, S.: Process Patterns for Software Systems In-house Integration and Merge \u2013 Experiences from Industry. In: Software Engineering and Advanced Applications (2005)","key":"17_CR13","DOI":"10.1109\/EUROMICRO.2006.57"},{"unstructured":"Wang, Y., Meng, X.-x., Shi, L., Wang, F.-j.: A Process Pattern Language for Agile Methods. In: Asia-Pacific Software Engineering Conference (2007)","key":"17_CR14"}],"container-title":["Lecture Notes in Computer Science","New Modeling Concepts for Today\u2019s Software Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14347-2_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:51:21Z","timestamp":1606186281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14347-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143465","9783642143472"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14347-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}