{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:47:28Z","timestamp":1754110048045,"version":"3.34.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493611","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T17:37:07Z","timestamp":1209404227000},"page":"749-754","source":"Crossref","is-referenced-by-count":49,"title":["Integrating software development security activities with agile methodologies"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Keramati","sequence":"first","affiliation":[]},{"given":"Seyed-Hassan","family":"Mirian-Hosseinabadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Systems Security Engineering - Capability Maturity Model (SSE-CMM) official web site","year":"2007","key":"13"},{"year":"2002","key":"14"},{"year":"0","key":"11"},{"journal-title":"The Common Criteria Portal","year":"2007","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1065907.1066034"},{"key":"2","article-title":"on the secure software development proecss: clasp and sdl compared","author":"gre?goire","year":"2007","journal-title":"Proceedings of the Third International Workshop on Software Engineering for Secure Systems"},{"journal-title":"The Security Development Lifecycle - SDL A Process for Developing Demonstrably More Secure Software","year":"2006","author":"howard","key":"1"},{"journal-title":"Build Security In","year":"2006","key":"10"},{"key":"7","article-title":"security metrics guide for information technology systems, nist, computer security division","volume":"800 55","author":"swanson","year":"2003","journal-title":"NIST Special Publication"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/986655.986664","article-title":"a process for developing secure and usable systems","author":"flechais","year":"2003","journal-title":"Proceedings of the 2003 Workshop on New Security Paradigms"},{"key":"4","article-title":"extreme security engineering: on employing xp practices to achieve 'good enough security ' without defining it","author":"beznosov","year":"2003","journal-title":"First ACM Workshop on Business Driven Security Engineering"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2008,3,31]]},"location":"Doha, Qatar","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493611.pdf?arnumber=4493611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T22:54:08Z","timestamp":1738191248000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493611","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}