{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:46Z","timestamp":1761621166392},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T00:00:00Z","timestamp":1396137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11623-014-0102-0","type":"journal-article","created":{"date-parts":[[2014,3,29]],"date-time":"2014-03-29T21:11:27Z","timestamp":1396127487000},"page":"257-261","source":"Crossref","is-referenced-by-count":8,"title":["Developing secure software"],"prefix":"10.1007","volume":"38","author":[{"given":"Ruediger","family":"Bachmann","sequence":"first","affiliation":[]},{"given":"Achim D.","family":"Brucker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,30]]},"reference":[{"key":"102_CR1","volume-title":"2011 CWE\/SANS Top 25 Most Dangerous Software Errors","author":"Mitre.","year":"2011","unstructured":"Mitre. 2011 CWE\/SANS Top 25 Most Dangerous Software Errors. \n                    http:\/\/cwe.mitre.org\/top25\/\n                    \n                  , 2011. Site visited on 2014-01-06."},{"key":"102_CR2","unstructured":"National Institute of Standards and Technology (NIST). National Vulnerability Database. \n                    http:\/\/nvd.nist.gov\/\n                    \n                  . Site visited on 2014-01-06."},{"key":"102_CR3","volume-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","author":"MP Gallaher","year":"2002","unstructured":"M.P. Gallaher and B.M. Kropp. The Economic Impacts of Inadequate Infrastructure for Software Testing. Technical Report Planning Report 02-03, National Institute of Standards & Technology, May 2002."},{"key":"102_CR4","volume-title":"The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software","author":"M Howard","year":"2006","unstructured":"Howard, Michael; Lipner, Steve (June 2006). The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software. Microsoft Press."},{"key":"102_CR5","volume-title":"GI Sicherheit 2014. Lecture Notes in Informatics, GI","author":"D Achim","year":"2014","unstructured":"Achim D. Brucker and Uwe Sodan. Deploying Static Application Security Testing on a Large Scale. In GI Sicherheit 2014. Lecture Notes in Informatics, GI, 2014."},{"issue":"3","key":"102_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Patrice Godefroid, Michael Y. Levin, David A. Molnar: SAGE: whitebox fuzzing for security testing. Commun. ACM 55(3): 40\u201344 (2012)","journal-title":"Commun. ACM"},{"key":"102_CR7","first-page":"1","volume-title":"Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering","author":"R Scandariato","year":"2013","unstructured":"Riccardo Scandariato, James Walden, and Wouter Joosen. Static analysis versus penetration testing: a controlled experiment. In Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering, pages 1\u201310. IEEE, November 2013."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0102-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0102-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0102-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0102-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:41Z","timestamp":1559413361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0102-0"}},"subtitle":["A holistic approach to security testing"],"short-title":[],"issued":{"date-parts":[[2014,3,30]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["102"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0102-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,30]]}}}