{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:41Z","timestamp":1750308101527,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>The SESS'05 held in St. Louis, MO on May 15-16 was intended to be a venue to discuss techniques for building and validating secure applications. Workshop attendees (about 40 people) came both from the software engineering and the security community, raising a fruitful discussion and exchange of ideas and problem perspectives.<\/jats:p>","DOI":"10.1145\/1082983.1082996","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Software engineering for secure systems"],"prefix":"10.1145","volume":"30","author":[{"given":"Danilo","family":"Bruschi","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Bart","family":"De Win","sequence":"additional","affiliation":[{"name":"Katholieke Universiteit Leuven, Leuven, Belgium"}]},{"given":"Mattia","family":"Monga","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2005,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"O. E. Demir P. Devanbu N. Medvidovic and E. Wohlstadter \"DISCOA: architectural adaptions for security and QoS O. E. Demir P. Devanbu N. Medvidovic and E. Wohlstadter \"DISCOA: architectural adaptions for security and QoS"},{"key":"e_1_2_1_2_1","unstructured":"M. Rits B. D. Boe and A. Schaad \"XacT: a bridge between resource management and access control in multilayered applications\"  M. Rits B. D. Boe and A. Schaad \"XacT: a bridge between resource management and access control in multilayered applications\""},{"key":"e_1_2_1_3_1","unstructured":"S. Banerjee C. A. Mattmann N. Medvidovic and L. Golubchik \"Leveraging architectural models to inject trust into software systems\"  S. Banerjee C. A. Mattmann N. Medvidovic and L. Golubchik \"Leveraging architectural models to inject trust into software systems\""},{"key":"e_1_2_1_4_1","unstructured":"J. Ren R. Taylor P. Dourish and D. Redmiles \"Towards an architectural treatment of software security: A connector-centric approach\"  J. Ren R. Taylor P. Dourish and D. Redmiles \"Towards an architectural treatment of software security: A connector-centric approach\""},{"key":"e_1_2_1_5_1","unstructured":"B. D. Win F. Piessens J. Smans and W. Joosen \"Towards a unifying view on security contracts\"  B. D. Win F. Piessens J. Smans and W. Joosen \"Towards a unifying view on security contracts\""},{"key":"e_1_2_1_6_1","unstructured":"T. Verhanneman F. Piessens B. D. Win and W. Joosen \"Requirements traceability to support evolution of access control\"  T. Verhanneman F. Piessens B. D. Win and W. Joosen \"Requirements traceability to support evolution of access control\""},{"key":"e_1_2_1_7_1","unstructured":"S.-W. Lee R. Gandhi and G.-J. Ahn \"Establishing trustworthiness in services of the critical infrastructure through certication and accreditation\"  S.-W. Lee R. Gandhi and G.-J. Ahn \"Establishing trustworthiness in services of the critical infrastructure through certication and accreditation\""},{"key":"e_1_2_1_8_1","unstructured":"Z. Dwaikat and F. Parisi-Presicce \"Risky trust: Risk-based analysis of software systems\"  Z. Dwaikat and F. Parisi-Presicce \"Risky trust: Risk-based analysis of software systems\""},{"key":"e_1_2_1_9_1","unstructured":"N. R. Mead and T. Stehney \"Security quality requirements engineering (SQUARE) methodology\"  N. R. Mead and T. Stehney \"Security quality requirements engineering (SQUARE) methodology\""},{"key":"e_1_2_1_10_1","unstructured":"K. Sohr L. Migge and G.-J. Ahn \"Articulating and enforcing authorisation policies with UML and OCL\"  K. Sohr L. Migge and G.-J. Ahn \"Articulating and enforcing authorisation policies with UML and OCL\""},{"key":"e_1_2_1_11_1","unstructured":"B. Breech and L. Pollock \"A framework for testing security mechanisms for program-based attacks\"  B. Breech and L. Pollock \"A framework for testing security mechanisms for program-based attacks\""},{"key":"e_1_2_1_12_1","unstructured":"S. Weber P. Karger and A. Paradkar \"A software flaw taxonomy: Aiming tools at security\"  S. Weber P. Karger and A. Paradkar \"A software flaw taxonomy: Aiming tools at security\""},{"key":"e_1_2_1_13_1","unstructured":"W. Masri and A. Podgurski \u00bf\u00c8Using dynamic information flow analysis to detect attacks against applications\"  W. Masri and A. Podgurski \u00bf\u00c8Using dynamic information flow analysis to detect attacks against applications\""},{"key":"e_1_2_1_14_1","unstructured":"M. Jochen A. A. Anteneh L. Pollock and L. Marvel \"Enabling control over adaptive program transformation for dynamically evolving mobile software validation\"  M. Jochen A. A. Anteneh L. Pollock and L. Marvel \"Enabling control over adaptive program transformation for dynamically evolving mobile software validation\""},{"key":"e_1_2_1_15_1","unstructured":"M. Gegick and L. Williams \"Matching attack patterns to security vulnerabilities in software-intensive system designs\"  M. Gegick and L. Williams \"Matching attack patterns to security vulnerabilities in software-intensive system designs\""}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1082996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1082996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:02Z","timestamp":1750262882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1082996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1082996"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1082996","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,7]]},"assertion":[{"value":"2005-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}