{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:03:30Z","timestamp":1730210610415,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cscesm.2015.7331876","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:45Z","timestamp":1448318685000},"page":"103-108","source":"Crossref","is-referenced-by-count":0,"title":["Automatic acceptance testing of the web application security with ITU-T X.805 framework"],"prefix":"10.1109","author":[{"given":"Paresh","family":"Rathod","sequence":"first","affiliation":[]},{"given":"Viljami","family":"Julkunen","sequence":"additional","affiliation":[]},{"given":"Tero","family":"Kaisti","sequence":"additional","affiliation":[]},{"given":"Janne","family":"Nissila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Innovation The Five Disciplines for Creating what Customers Want Crown Business","year":"2006","author":"carlson","key":"ref10"},{"journal-title":"(2013 September) IT security frameworks and standards Choosing the right one TechTarget Network","year":"0","author":"granneman","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2004.11.001"},{"key":"ref13","first-page":"402","article-title":"A policy based approach to security for the semantic web","author":"kagal","year":"2003","journal-title":"International Semantic Web Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20247"},{"journal-title":"The Cucumber Book Behaviour-Driven Development for Testers and Developers Pragmatic Bookshelf","year":"2012","author":"wynne","key":"ref15"},{"key":"ref16","first-page":"16","article-title":"Challenges generated by the implementation of the IT standards CobiT 4.1, ITIL v3 and ISO\/IEC 27002 in enterprises","volume":"43","author":"n\u00e4stase","year":"2009","journal-title":"Economic Computation & Economic Cybernetics Studies & Research"},{"journal-title":"SOA Principles of Service Design","year":"2008","author":"erl","key":"ref4"},{"journal-title":"Web Services and SOA Principles and Technology","year":"2012","author":"papazoglou","key":"ref3"},{"journal-title":"International Telecommunication Union Security Architecture for Systems Providing End-to-End Communications ITU-T Rec X 805","year":"2003","key":"ref6"},{"key":"ref5","first-page":"108","article-title":"The Network Cheat Sheet &#x2013; ISO 27001","author":"winder","year":"2015","journal-title":"PC PRO"},{"article-title":"Manifesto for agile software development","year":"2001","author":"beck","key":"ref8"},{"journal-title":"Security in a Web 2 0 World A Standards-Based Approach John Wiley & Sons","year":"2009","author":"solari","key":"ref7"},{"journal-title":"Governing Europe's Marine Environment Europeanization of Regional Seas or Regionalization of EU Policies?","year":"2015","author":"kern","key":"ref2"},{"key":"ref1","first-page":"36","article-title":"Benefits and limitations of automated software testing: Systematic literature review and practitioner survey","author":"rafi","year":"2012","journal-title":"Proceedings of the 7th International Workshop on Automation of Software Test (AST)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201204"}],"event":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","start":{"date-parts":[[2015,9,21]]},"location":"Lodz, Poland","end":{"date-parts":[[2015,9,23]]}},"container-title":["2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322102\/7331817\/07331876.pdf?arnumber=7331876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:52:29Z","timestamp":1602687149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7331876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cscesm.2015.7331876","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}