{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:29:54Z","timestamp":1778084994699,"version":"3.51.4"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icdim.2018.8847007","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T21:38:32Z","timestamp":1569533912000},"page":"94-101","source":"Crossref","is-referenced-by-count":5,"title":["Compliance at Velocity within a DevOps Environment"],"prefix":"10.1109","author":[{"given":"Muhammad Zaid","family":"Abrahams","sequence":"first","affiliation":[{"name":"Academy of Computer Science and Software Engineering, Faculty of Science, University of Johannesburg, Johannesburg, Gauteng, South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Josef J","family":"Langerman","sequence":"additional","affiliation":[{"name":"Academy of Computer Science and Software Engineering, Faculty of Science, University of Johannesburg, Johannesburg, Gauteng, South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.92"},{"key":"ref11","author":"sharma","year":"2015","journal-title":"DevOps For Dummies&#x00C2;&#x00AE; IBM Limited Edition"},{"key":"ref12","year":"2009","journal-title":"ITIL&#x00AE; v3 Foundation Study Guide"},{"key":"ref13","author":"varhol","year":"2017","journal-title":"The complete history of agile software development"},{"key":"ref14","author":"subramaniyan","year":"2009","journal-title":"Enabling Compliance Requirements using ISMS Framework (ISO27001)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2016.7601"},{"key":"ref4","year":"2014","journal-title":"Chef - Code Can | Chef"},{"key":"ref3","author":"bird","year":"2016","journal-title":"Devops"},{"key":"ref6","first-page":"1","author":"demartine","year":"2015","journal-title":"The Seven Habits of Rugged DevOps"},{"key":"ref5","year":"2017","journal-title":"Cloud Management Chef"},{"key":"ref8","year":"2013","journal-title":"27001 - Information security management"},{"key":"ref7","year":"2017","journal-title":"InSpec DSL"},{"key":"ref2","author":"beal","year":"2016","journal-title":"What is DevOps (Development and Operations)? A Webopedia com IT Definition"},{"key":"ref1","author":"bartsi\u2019c","year":"2012","journal-title":"Iterative Evaluation of Domain-Sp ecific Languages"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.155"}],"event":{"name":"2018 Thirteenth International Conference on Digital Information Management (ICDIM)","location":"Berlin, Germany","start":{"date-parts":[[2018,9,24]]},"end":{"date-parts":[[2018,9,26]]}},"container-title":["2018 Thirteenth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8843511\/8846966\/08847007.pdf?arnumber=8847007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:43:18Z","timestamp":1754332998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8847007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdim.2018.8847007","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}