{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:11Z","timestamp":1750308611321,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3194760.3194763","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T15:07:57Z","timestamp":1536851277000},"page":"27-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Exploiting devops practices for dependable and secure continuous delivery pipelines"],"prefix":"10.1145","author":[{"given":"Thomas F.","family":"D\u00fcllmann","sequence":"first","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Christina","family":"Paule","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Andr\u00e9","family":"van Hoorn","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820690.2820696"},{"key":"e_1_3_2_1_3_1","unstructured":"Leonard J. Bass Ingo M. Weber and Liming Zhu. 2015. DevOps --- A Software Architect's Perspective. Addison-Wesley.   Leonard J. Bass Ingo M. Weber and Liming Zhu. 2015. DevOps --- A Software Architect's Perspective. Addison-Wesley."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491055.2491070"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178368.3190610"},{"volume-title":"Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation. Pearson Education.","year":"2010","author":"Humble Jez","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ISO\/IEC. 2016. ISO\/IEC 27000: Information technology --- Security techniques --- Information security management systems --- Overview and vocabulary. (02 2016).  ISO\/IEC. 2016. ISO\/IEC 27000: Information technology --- Security techniques --- Information security management systems --- Overview and vocabulary. (02 2016)."},{"key":"e_1_3_2_1_8_1","unstructured":"Juha Kuusela. 2017. Security testing in continuous integration processes. Master's thesis. Aalto University School of Science Finland.  Juha Kuusela. 2017. Security testing in continuous integration processes. Master's thesis. Aalto University School of Science Finland."},{"volume-title":"Proc. International Conference on Performance, Computing, and Communications (IPCCC). IEEE, 827--832","year":"2004","author":"Langweg Hanno","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Simon Lipke. 2017. Building a Secure Software Supply Chain using Docker. Master's thesis. Hochschule der Medien Stuttgart Germany.  Simon Lipke. 2017. Building a Secure Software Supply Chain using Docker. Master's thesis. Hochschule der Medien Stuttgart Germany."},{"key":"e_1_3_2_1_11_1","unstructured":"Kief Morris. 2016. Infrastructure as code: managing servers in the cloud. O'Reilly Media Inc.   Kief Morris. 2016. Infrastructure as code: managing servers in the cloud. O'Reilly Media Inc."},{"key":"e_1_3_2_1_12_1","unstructured":"Michael Nygard. 2007. Release It!: Design and Deploy Production-Ready Software.   Michael Nygard. 2007. Release It!: Design and Deploy Production-Ready Software."},{"key":"e_1_3_2_1_13_1","unstructured":"Open Web Application Security Project. 2017. OWASP Top 10 - 2017. (2017).  Open Web Application Security Project. 2017. OWASP Top 10 - 2017. (2017)."},{"key":"e_1_3_2_1_14_1","volume-title":"Chaos Engineering: Building Confidence in System Behavior through Experiments","author":"Rosenthal Casey","year":"2017","edition":"1"},{"key":"e_1_3_2_1_15_1","unstructured":"Adam Shostack. 2014. Threat modeling: Designing for security. John Wiley & Sons.   Adam Shostack. 2014. Threat modeling: Designing for security. John Wiley & Sons."},{"key":"e_1_3_2_1_16_1","unstructured":"Damir Sta\u017ei\u0107. 2017. Security DevOps: Konzeption einer Umgebung zur Integration von Sicherheitstests in agile Softwareentwicklungsprozesse. Master's thesis. Reutlingen University.  Damir Sta\u017ei\u0107. 2017. Security DevOps: Konzeption einer Umgebung zur Integration von Sicherheitstests in agile Softwareentwicklungsprozesse. Master's thesis. Reutlingen University."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.08.046"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006318200570068"},{"key":"e_1_3_2_1_19_1","unstructured":"Johannes Wettinger. 2017. Gathering solutions and providing APIs for their orchestration to implement continuous software delivery. Ph.D. Dissertation. University of Stuttgart Germany.  Johannes Wettinger. 2017. Gathering solutions and providing APIs for their orchestration to implement continuous software delivery. Ph.D. Dissertation. University of Stuttgart Germany."}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 4th International Workshop on Rapid Continuous Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194760.3194763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194760.3194763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:23Z","timestamp":1750273643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194760.3194763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":19,"alternative-id":["10.1145\/3194760.3194763","10.1145\/3194760"],"URL":"https:\/\/doi.org\/10.1145\/3194760.3194763","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}