{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:14Z","timestamp":1750307054486,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,18]]},"DOI":"10.1145\/2413296.2413300","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"27-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Point-and-shoot security design"],"prefix":"10.1145","author":[{"given":"Sven","family":"T\u00fcrpe","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654439"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Anderson\n    .\n      \n  \n   \n  Liability and computer security: Nine principles. In D. Gollmann editor Computer Security -- ESORICS 94 volume \n  875\n   of \n  LNCS pages \n  231\n  --\n  245\n  . \n  Springer Berlin \/ Heidelberg 1994\n  .   R. Anderson. Liability and computer security: Nine principles. In D. Gollmann editor Computer Security -- ESORICS 94 volume 875 of LNCS pages 231--245. Springer Berlin \/ Heidelberg 1994.","DOI":"10.1007\/3-540-58618-0_67"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/162124.162127"},{"key":"e_1_3_2_1_4_1","unstructured":"S. Berkun. Programmers designers and the Brooklyn bridge Mar. 2004. http:\/\/www.scottberkun.com\/essays\/30-programmers-designers-and-the-brooklyn-bridge\/.  S. Berkun. Programmers designers and the Brooklyn bridge Mar. 2004. http:\/\/www.scottberkun.com\/essays\/30-programmers-designers-and-the-brooklyn-bridge\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710831152"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073280"},{"key":"e_1_3_2_1_7_1","unstructured":"BITS software assurance framework. http:\/\/www.bits.org\/publications\/security\/BITSSoftwareAssurance0112.pdf Jan. 2012.  BITS software assurance framework. http:\/\/www.bits.org\/publications\/security\/BITSSoftwareAssurance0112.pdf Jan. 2012."},{"volume-title":"The Open Group","year":"2004","author":"Blakley B.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134288"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.625346"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.012"},{"key":"e_1_3_2_1_13_1","unstructured":"Common Criteria for Information Technology Security Evaluation July 2009. Version 3.1 revision 3.  Common Criteria for Information Technology Security Evaluation July 2009. Version 3.1 revision 3."},{"volume-title":"Cambridge University Press","year":"1998","author":"Coplien J. O.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Corman. Intro to HDMoore's Law. http:\/\/blog.cognitivedissidents.com\/2011\/11\/01\/intro-to-hdmoores-law\/.  J. Corman. Intro to HDMoore's Law. http:\/\/blog.cognitivedissidents.com\/2011\/11\/01\/intro-to-hdmoores-law\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413296.2413309"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018407"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.101"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.56"},{"key":"e_1_3_2_1_20_1","unstructured":"European Central Bank. Biannual information on euro banknote counterfeiting. Press release 16 July 2012 http:\/\/www.ecb.int\/press\/pr\/date\/2012\/html\/pr120716.en.html July 2012.  European Central Bank. Biannual information on euro banknote counterfeiting. Press release 16 July 2012 http:\/\/www.ecb.int\/press\/pr\/date\/2012\/html\/pr120716.en.html July 2012."},{"key":"e_1_3_2_1_21_1","unstructured":"European Commission. Euro coin counterfeiting in 2011. Press release 27 January 2012 http:\/\/ec.europa.eu\/commission_2010--2014\/semeta\/headlines\/news\/2012\/01\/20120127_en.htm Jan. 2012.  European Commission. Euro coin counterfeiting in 2011. Press release 27 January 2012 http:\/\/ec.europa.eu\/commission_2010--2014\/semeta\/headlines\/news\/2012\/01\/20120127_en.htm Jan. 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379692"},{"volume-title":"Thames and Hudson","year":"1962","author":"Feininger A.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","first-page":"16","volume-title":"Software Engineering for Secure Systems: Industrial and Research Perspectives","author":"Fernandez E. B.","year":"2010"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413296.2413306"},{"key":"e_1_3_2_1_26_1","unstructured":"M. Freeman. The Photographer's Mind. Elsevier Science & Technology Books 2010.  M. Freeman. The Photographer's Mind. Elsevier Science & Technology Books 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"K. M. Goertzel T. Winograd H. L. McKinley L. J. Oh M. Colon T. McGibbon E. Fedchak and R. Vienneau. Software security assurance: A state-of-the-art report (SOAR) 2007.  K. M. Goertzel T. Winograd H. L. McKinley L. J. Oh M. Colon T. McGibbon E. Fedchak and R. Vienneau. Software security assurance: A state-of-the-art report (SOAR) 2007.","DOI":"10.21236\/ADA472363"},{"volume-title":"CA","year":"2003","author":"Graham P.","key":"e_1_3_2_1_28_1"},{"volume-title":"Art Documentary Film","year":"2010","author":"Long","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"K. Henney. Down on the upside. http:\/\/www.artima.com\/weblogs\/viewpost.jsp?thread=341297 Mar. 2012.  K. Henney. Down on the upside. http:\/\/www.artima.com\/weblogs\/viewpost.jsp?thread=341297 Mar. 2012."},{"volume-title":"Microsoft Press","year":"2006","author":"Howard M.","key":"e_1_3_2_1_31_1"},{"volume-title":"Universal Applications. Elsevier Science","year":"2012","author":"Johnson C.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"S. Kelby. Crush the composition. Google+ Photographer's Conference presentation http:\/\/www.youtube.com\/watch?v=FpHMuK7Htic May 2012.  S. Kelby. Crush the composition. Google+ Photographer's Conference presentation http:\/\/www.youtube.com\/watch?v=FpHMuK7Htic May 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/361604.361612"},{"volume-title":"Univ. of Chicago Press","year":"1996","author":"Lakoff G.","key":"e_1_3_2_1_35_1"},{"volume-title":"Amherst Media","year":"2002","author":"Lav. Zone System B.","key":"e_1_3_2_1_36_1"},{"volume-title":"Fourth Annual Layered Assurance Workshop (LAW 2010)","year":"2010","author":"Locasto M. E.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920281"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900548"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.646892"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872157"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/784590.784691"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.109"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.48"},{"key":"e_1_3_2_1_46_1","unstructured":"Microsoft. Microsoft security development lifecycle (SDL). Version 5.1.  Microsoft. Microsoft security development lifecycle (SDL). Version 5.1."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335206"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Parnas\n    .\n      \n  \n   \n  Teaching programming as engineering. In J. Bowen and M. Hinchey editors ZUM '95: The Z Formal Specification Notation volume \n  967\n   of \n  LNCS pages \n  470\n  --\n  481\n  . \n  Springer Berlin \/ Heidelberg 1995\n  .   D. Parnas. Teaching programming as engineering. In J. Bowen and M. Hinchey editors ZUM '95: The Z Formal Specification Notation volume 967 of LNCS pages 470--481. Springer Berlin \/ Heidelberg 1995.","DOI":"10.1007\/3-540-60271-2_137"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267897"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.22"},{"key":"e_1_3_2_1_51_1","unstructured":"The jargon file. http:\/\/catb.org\/jargon\/ Oct. 2004. Version 4.4.8.  The jargon file. http:\/\/catb.org\/jargon\/ Oct. 2004. Version 4.4.8."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(94)90065-5"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36275"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640162.1655274"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872154"},{"issue":"12","key":"e_1_3_2_1_57_1","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier B.","year":"1999","journal-title":"Dr. Dobb's journal"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"M. Schnelle-Schneyder. Sehen und Photographie: -sthetik und Bild. X.media.press \/ publishing. Springer 2nd edition 2011.  M. Schnelle-Schneyder. Sehen und Photographie: -sthetik und Bild. X.media.press \/ publishing. Springer 2nd edition 2011.","DOI":"10.1007\/978-3-642-15150-7"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366185"},{"key":"e_1_3_2_1_60_1","unstructured":"M.\n       \n      Schumacher\n    .\n      \n  \n   \n  Security Patterns: Integrating Security and Systems Engineering\n  . \n  Wiley series in software design patterns\n  . \n  John Wiley & Sons 2006\n  .   M. Schumacher. Security Patterns: Integrating Security and Systems Engineering. Wiley series in software design patterns. John Wiley & Sons 2006."},{"key":"e_1_3_2_1_61_1","unstructured":"A. Shostack. Engineers are people too. Slide deck I3P SAUSAGE workshop http:\/\/www.homeport.org\/adam\/Engineers-are-people-too-SAUSAGE.pptx Apr. 2011.  A. Shostack. Engineers are people too. Slide deck I3P SAUSAGE workshop http:\/\/www.homeport.org\/adam\/Engineers-are-people-too-SAUSAGE.pptx Apr. 2011."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.63"},{"key":"e_1_3_2_1_63_1","unstructured":"C. Swan. Building security in -- the audit paradox. http:\/\/blog.thestateofme.com\/2012\/01\/28\/building-security-in-the-audit-paradox\/ Jan. 2012.  C. Swan. Building security in -- the audit paradox. http:\/\/blog.thestateofme.com\/2012\/01\/28\/building-security-in-the-audit-paradox\/ Jan. 2012."},{"volume-title":"Microsoft Press","year":"2004","author":"Swiderski F.","key":"e_1_3_2_1_64_1"},{"key":"e_1_3_2_1_65_1","first-page":"2011","article-title":"In E. N. Zalta, editor, The Stanford Encyclopedia of Philosophy. Metaphysics Research Lab","author":"Swoyer C.","year":"2011","journal-title":"CSLI"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v11i1.143"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719036"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.58215"},{"key":"e_1_3_2_1_69_1","first-page":"26","volume-title":"Proceedings","author":"Wing J. M.","year":"1998"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2008.33"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076770"}],"event":{"name":"NSPW '12: The New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc","ACM Association for Computing Machinery","Microsoft Microsoft","CA Labs CA Labs"],"location":"Bertinoro Italy","acronym":"NSPW '12"},"container-title":["Proceedings of the 2012 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413296.2413300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:09Z","timestamp":1750238469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413300"}},"subtitle":["can we build better tools for developers?"],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":71,"alternative-id":["10.1145\/2413296.2413300","10.1145\/2413296"],"URL":"https:\/\/doi.org\/10.1145\/2413296.2413300","relation":{},"subject":[],"published":{"date-parts":[[2012,9,18]]},"assertion":[{"value":"2012-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}