{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:09:51Z","timestamp":1763968191404,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Maryland Procurement Office","award":["H98230-14-C-0127"],"award-info":[{"award-number":["H98230-14-C-0127"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,20]]},"DOI":"10.1145\/2986012.2986024","type":"proceedings-article","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T14:16:42Z","timestamp":1477059402000},"page":"180-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Helping Johnny encrypt: toward semantic interfaces for cryptographic frameworks"],"prefix":"10.1145","author":[{"given":"Soumya","family":"Indela","sequence":"first","affiliation":[{"name":"University of Maryland at College Park, USA"}]},{"given":"Mukul","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"University of Maryland at College Park, USA"}]},{"given":"Kartik","family":"Nayak","sequence":"additional","affiliation":[{"name":"University of Maryland at College Park, USA"}]},{"given":"Tudor","family":"Dumitra\u015f","sequence":"additional","affiliation":[{"name":"University of Maryland at College Park, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cryptography.io - cryptographic standard library 2013.  Cryptography.io - cryptographic standard library 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"You get where you\u2019re looking for: The impact of information sources on code security","author":"Acar Y.","year":"2016","unstructured":"Y. Acar , M. Backes , S. Fahl , D. Kim , M. Mazurek , and C. Stransky . You get where you\u2019re looking for: The impact of information sources on code security . In IEEE Security &amp; Privacy , 2016 . Y. Acar, M. Backes, S. Fahl, D. Kim, M. Mazurek, and C. Stransky. You get where you\u2019re looking for: The impact of information sources on code security. In IEEE Security &amp; Privacy, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814228.2814229"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176622"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1145948.1145950"},{"key":"e_1_3_2_1_9_1","unstructured":"T. M. Corporation. Common weaknesses enumeration. https: \/\/cwe.mitre.org.  T. M. Corporation. Common weaknesses enumeration. https: \/\/cwe.mitre.org."},{"key":"e_1_3_2_1_10_1","volume-title":"Pattern Languages of Programs Conference (PLoP)","author":"Delessy-Gassant N.","year":"2004","unstructured":"N. Delessy-Gassant , E. B. Fernandez , S. Rajput , and M. M. Larrondo-Petrie . Patterns for application firewalls . In Pattern Languages of Programs Conference (PLoP) , 2004 . N. Delessy-Gassant, E. B. Fernandez, S. Rajput, and M. M. Larrondo-Petrie. Patterns for application firewalls. In Pattern Languages of Programs Conference (PLoP), 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516655"},{"key":"e_1_3_2_1_15_1","volume-title":"Design Patterns: Elements of Reusable Object-oriented Software","author":"Gamma E.","year":"1995","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design Patterns: Elements of Reusable Object-oriented Software . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1995 . ISBN 0-201-63361-2. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-oriented Software. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1995. ISBN 0-201-63361-2."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415481"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.114"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111320.1111045"},{"key":"e_1_3_2_1_22_1","volume-title":"August","author":"Kern C.","year":"2015","unstructured":"C. Kern . Preventing security bugs through software design , August 2015 . C. Kern. Preventing security bugs through software design, August 2015."},{"key":"e_1_3_2_1_23_1","unstructured":"D. Litzenberger. Pycrypto - the python cryptography toolkit.  D. Litzenberger. Pycrypto - the python cryptography toolkit."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815685"},{"key":"e_1_3_2_1_25_1","first-page":"32","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Reaves B.","year":"2015","unstructured":"B. Reaves , N. Scaife , A. Bates , P. Traynor , and K. R. Butler . Mo (bile) money, mo (bile) problems: analysis of branchless banking applications in the developing world . In 24th USENIX Security Symposium (USENIX Security 15) , pages 17\u2013 32 , 2015 . B. Reaves, N. Scaife, A. Bates, P. Traynor, and K. R. Butler. Mo (bile) money, mo (bile) problems: analysis of branchless banking applications in the developing world. In 24th USENIX Security Symposium (USENIX Security 15), pages 17\u201332, 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892230"},{"key":"e_1_3_2_1_27_1","volume-title":"Pattern Languages of Programs Conference (PLoP)","author":"Saridakis T.","year":"2003","unstructured":"T. Saridakis . Design patterns for fault containment . In Pattern Languages of Programs Conference (PLoP) , 2003 . T. Saridakis. Design patterns for fault containment. In Pattern Languages of Programs Conference (PLoP), 2003."},{"key":"e_1_3_2_1_28_1","first-page":"300","volume-title":"EuroPLoP","author":"Schumacher M.","year":"2002","unstructured":"M. Schumacher . Security patterns and security standards . In EuroPLoP , pages 289\u2013 300 , 2002 . M. Schumacher. Security patterns and security standards. In EuroPLoP, pages 289\u2013300, 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"EuroPLoP","author":"Schumacher M.","year":"2003","unstructured":"M. Schumacher . Firewall patterns . In EuroPLoP , 2003 . M. Schumacher. Firewall patterns. In EuroPLoP, 2003."},{"key":"e_1_3_2_1_30_1","volume-title":"Pattern Languages of Programs Conference (PLoP)","author":"Sommerlad P.","year":"2003","unstructured":"P. Sommerlad . Reverse proxy patterns . In Pattern Languages of Programs Conference (PLoP) , 2003 . P. Sommerlad. Reverse proxy patterns. In Pattern Languages of Programs Conference (PLoP), 2003."},{"key":"e_1_3_2_1_31_1","volume-title":"Pattern Languages of Programs Conference (PLoP)","author":"Sorensen K. E.","year":"2002","unstructured":"K. E. Sorensen . Session patterns . In Pattern Languages of Programs Conference (PLoP) , 2002 . K. E. Sorensen. Session patterns. In Pattern Languages of Programs Conference (PLoP), 2002."},{"key":"e_1_3_2_1_32_1","series-title":"Core Series","volume-title":"Web Services, and Identity Management","author":"Steel C.","year":"2005","unstructured":"C. Steel , R. Nagappan , and R. Lai . Core Security Patterns: Best Practices and Strategies for J2EE , Web Services, and Identity Management . Core Series . Prentice Hall PTR , 2005 . ISBN 9780131463073. C. Steel, R. Nagappan, and R. Lai. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Core Series. Prentice Hall PTR, 2005. ISBN 9780131463073."},{"key":"e_1_3_2_1_33_1","volume-title":"keyczar - easy-to-use crypto toolkit","author":"Team G. S.","year":"2008","unstructured":"G. S. Team . keyczar - easy-to-use crypto toolkit , 2008 . G. S. Team. keyczar - easy-to-use crypto toolkit, 2008."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_3"},{"key":"e_1_3_2_1_36_1","first-page":"61801","volume-title":"Pattern Languages of Programming Conference (PLoP)","volume":"51","author":"Yoder J.","year":"1997","unstructured":"J. Yoder and J. Barcalow . Architectural patterns for enabling application security . In Pattern Languages of Programming Conference (PLoP) , volume 51 , page 61801 , 1997 . J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In Pattern Languages of Programming Conference (PLoP), volume 51, page 61801, 1997."},{"key":"e_1_3_2_1_37_1","volume-title":"34th International Conference on Software Engineering, ICSE 2012","author":"Yskout K.","year":"2012","unstructured":"K. Yskout , R. Scandariato , and W. Joosen . Does organizing security patterns focus architectural choices? In M. Glinz, G. C. Murphy, and M. Pezz\u00e8, editors , 34th International Conference on Software Engineering, ICSE 2012 , June 2-9, 2012 , Zurich, Switzerland, pages 617\u2013627. IEEE , 2012. ISBN 978-1-4673-1067-3. doi: 10.1109\/ICSE.2012.6227155. 10.1109\/ICSE.2012.6227155 K. Yskout, R. Scandariato, and W. Joosen. Does organizing security patterns focus architectural choices? In M. Glinz, G. C. Murphy, and M. Pezz\u00e8, editors, 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland, pages 617\u2013627. IEEE, 2012. ISBN 978-1-4673-1067-3. doi: 10.1109\/ICSE.2012.6227155."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663758"}],"event":{"name":"SPLASH '16: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"],"location":"Amsterdam Netherlands","acronym":"SPLASH '16"},"container-title":["Proceedings of the 2016 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2986012.2986024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2986012.2986024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:33Z","timestamp":1750217973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2986012.2986024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,20]]},"references-count":37,"alternative-id":["10.1145\/2986012.2986024","10.1145\/2986012"],"URL":"https:\/\/doi.org\/10.1145\/2986012.2986024","relation":{},"subject":[],"published":{"date-parts":[[2016,10,20]]},"assertion":[{"value":"2016-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}