{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:31:41Z","timestamp":1737783101593,"version":"3.33.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s11623-007-0285-8","type":"journal-article","created":{"date-parts":[[2007,12,26]],"date-time":"2007-12-26T23:27:28Z","timestamp":1198711648000},"page":"884-887","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability of Code"],"prefix":"10.1007","volume":"31","author":[{"given":"Petra","family":"Barzin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,12,1]]},"reference":[{"unstructured":"Mark Dowd, John McDonald, Justin Schuh, The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities, November 10, 2006, Addison-Wesley Longman Verlag","key":"285_CR1"},{"unstructured":"Shawn Hernan, Scott Lambert, Tomasz Ostwald, Adam Shostack, Threat Modeling \u2014 Uncover Security Design Flaws Using The STRIDE Approach, MSDN magazine, November 2006, http:\/\/msdn.microsoft.com\/msdnmag\/issues\/06\/11\/ThreatModeling","key":"285_CR2"},{"unstructured":"Howard, Michael, Attack Surface: Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users, MSDN Magazine, November 2004, http:\/\/msdn.microsoft.com\/msdnmag\/issues\/04\/11\/AttackSurface\/default.aspx","key":"285_CR3"},{"unstructured":"Michael Howard, A Look Inside the Security Development Lifecycle at Microsoft, MSDN Magazine, November 2005, http:\/\/msdn.microsoft.com\/msdnmag\/issues\/05\/11\/SDL\/default.aspx","key":"285_CR4"},{"unstructured":"Elfriede Dustin, The Secure Software Development Lifecycle, November 2006, http:\/\/www.devsource.com\/print_article2\/0,1217,a=193825,00.asp","key":"285_CR5"},{"doi-asserted-by":"crossref","unstructured":"Steve Lipner, Michael Howard, The Trustworthy Computing Security Development Lifecycle, M\u00e4rz 2005, http:\/\/msdn2.microsoft.com\/en-us\/library\/ms995349.aspx","key":"285_CR6","DOI":"10.1109\/CSAC.2004.41"},{"unstructured":"J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Kishore Gopalan, Security Engineering Index, August 2005, MSDN, http:\/\/msdn2.microsoft.com\/en-us\/library\/ms998404.aspx","key":"285_CR7"},{"unstructured":"SAP: Sicheres Programmieren \u2014 Einf\u00fchrung in die sichere Anwendungsentwicklung, in Zusammenarbeit mit Microsoft, 2005, https:\/\/www.sicher-im-netz.de\/content\/sicherheit\/ihre\/software\/sicheresoftware\/download\/SichereProgrammierung.pdf","key":"285_CR8"},{"unstructured":"secologic: Die 10 Goldenen Regeln der IT-Sicherheit, Dezember 2006, http:\/\/www.secologic.de\/downloads\/software\/070205_10GoldenRules_SAP_CoBa_V1.pdf","key":"285_CR9"},{"doi-asserted-by":"crossref","unstructured":"Gary Stoneburner, Clark Hayden, Alexis Feringa, Engineering Principles for Information Technology Security (A Baseline for Achieving Security), NIST Special Publication 800-27 Rev A, Juni 2004, http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-27A\/SP800-27-RevA.pdf","key":"285_CR10","DOI":"10.6028\/NIST.SP.800-27ra"},{"unstructured":"Task Force on Security across the Software Development Lifecycle, Improving security across the software development lifecycle, April 2004, http:\/\/www.cyberpartnership.org\/SDLCFULL.pdf","key":"285_CR11"},{"unstructured":"John Viega, Security in the software development lifecycle, Oktober 2004, http:\/\/www-128.ibm.com\/developerworks\/rational\/library\/content\/RationalEdge\/oct04\/viega\/index.html","key":"285_CR12"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0285-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0285-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0285-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T20:59:36Z","timestamp":1737752376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0285-8"}},"subtitle":["Security Design Flaws"],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":12,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["285"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0285-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}