{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:27:14Z","timestamp":1767065234866,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011105","name":"European Commission","doi-asserted-by":"publisher","award":["644962"],"award-info":[{"award-number":["644962"]}],"id":[{"id":"10.13039\/100011105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3233765","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CryptSDLC"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Loruenser","sequence":"first","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"given":"Leon","family":"Sell","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"given":"Thomas","family":"Laenger","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"volume-title":"Buildings, Construction","author":"Alexander Christopher","unstructured":"Christopher Alexander , Sara Ishikawa , and Murray Silverstein . 1977. A Pattern Language: Towns , Buildings, Construction . Oxford University Press . Christopher Alexander, Sara Ishikawa, and Murray Silverstein. 1977. A Pattern Language: Towns, Buildings, Construction. Oxford University Press.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2814228.2814229"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-642-40012-4_12"},{"key":"e_1_3_2_1_4_1","first-page":"34","article-title":"Universal Composition with Responsive Environments","volume":"2016","author":"Camenisch Jan","year":"2016","unstructured":"Jan Camenisch , Robert R. Enderlein , Stephan Krenn , Ralf K\u00fcsters , and Daniel Rausch . 2016 . Universal Composition with Responsive Environments . IACR Cryptology ePrint Archive 2016 (2016), 34 . http:\/\/eprint.iacr.org\/2016\/034 Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf K\u00fcsters, and Daniel Rausch. 2016. Universal Composition with Responsive Environments. IACR Cryptology ePrint Archive 2016 (2016), 34. http:\/\/eprint.iacr.org\/2016\/034","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_5_1","volume-title":"Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti . 2001 . Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001. IEEE Computer Society, 136--145. Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001. IEEE Computer Society, 136--145."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/11864219_17"},{"key":"e_1_3_2_1_7_1","volume-title":"4th Theory of Cryptography Conference, TCC 2007 (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.)","volume":"4392","author":"Canetti Ran","year":"2007","unstructured":"Ran Canetti , Yevgeniy Dodis , Rafael Pass , and Shabsi Walfish . 2007 . Universally Composable Security with Global Setup. In Theory of Cryptography , 4th Theory of Cryptography Conference, TCC 2007 (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.) , Vol. 4392 . Springer, 61--85. Ran Canetti, Yevgeniy Dodis, Rafael Pass, and Shabsi Walfish. 2007. Universally Composable Security with Global Setup. In Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007 (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.), Vol. 4392. Springer, 61--85."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MSP.2004.21"},{"key":"e_1_3_2_1_9_1","volume-title":"Privacy Design Patterns and Anti-Patterns. In Workshop \"A Turn for the Worse: Trustbusters for User Interfaces Workshop\" at SOUPS 2013 Newcastle, UK.","author":"Doty Nick","year":"2013","unstructured":"Nick Doty and Mohit Gupta . 2013 . Privacy Design Patterns and Anti-Patterns. In Workshop \"A Turn for the Worse: Trustbusters for User Interfaces Workshop\" at SOUPS 2013 Newcastle, UK. Nick Doty and Mohit Gupta. 2013. Privacy Design Patterns and Anti-Patterns. In Workshop \"A Turn for the Worse: Trustbusters for User Interfaces Workshop\" at SOUPS 2013 Newcastle, UK."},{"volume-title":"et al. Chandra","year":"2009","unstructured":"Pravir. et al. Chandra . 2009 . Software Assurance Maturity Model . (2009), 96 pages. https:\/\/www.owasp.org\/index.php\/OWASP{_}SAMM{_}Project Pravir. et al. Chandra. 2009. Software Assurance Maturity Model. (2009), 96 pages. https:\/\/www.owasp.org\/index.php\/OWASP{_}SAMM{_}Project","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"of","author":"European Commission. 2016. Regulation (EU) 2016\/679 of The European Parliament and of The Council","year":"2016","unstructured":"European Commission. 2016. Regulation (EU) 2016\/679 of The European Parliament and of The Council , of 27 April 2016 , on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) . (2016). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016R0679 (online 20.7.2017). European Commission. 2016. Regulation (EU) 2016\/679 of The European Parliament and of The Council, of 27 April 2016, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). (2016). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016R0679 (online 20.7.2017)."},{"unstructured":"S. Fischer-H\u00fcbnner C. K\u00f6ffel J.-S. Pettersson P. Wolkerstorfer C. Graf and L. Holtz. 2011. HCI Pattern Collection--Version 2. (2011). http:\/\/primelife.ercim.eu\/results\/documents\/111-413d (PrimeLife project).  S. Fischer-H\u00fcbnner C. K\u00f6ffel J.-S. Pettersson P. Wolkerstorfer C. Graf and L. Holtz. 2011. HCI Pattern Collection--Version 2. (2011). http:\/\/primelife.ercim.eu\/results\/documents\/111-413d (PrimeLife project).","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma Erich","year":"1994","unstructured":"Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . 1994 . Design Patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley . ISBN 0-201-63361-2. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. 1994. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley. ISBN 0-201-63361-2."},{"volume-title":"A Roadmap for High Assurance Cryptography","author":"Halpin Harry","unstructured":"Harry Halpin . 2018. A Roadmap for High Assurance Cryptography . Springer , Cham , 83--91. Harry Halpin. 2018. A Roadmap for High Assurance Cryptography. Springer, Cham, 83--91.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3098954.3104055"},{"volume-title":"The security development lifecycle: SDL, a process for developing demonstrably more secure software","author":"Howard Michael","unstructured":"Michael Howard and Steve. Lipner. 2006. The security development lifecycle: SDL, a process for developing demonstrably more secure software . Microsoft Press . Michael Howard and Steve. Lipner. 2006. The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ARES.2016.73"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/CloudCom.2014.85"},{"volume-title":"Information technology --- Cloud computing --- Service level agreement (SLA) framework and technology --- Part 1: Overview and concepts. Standard","author":"ISO.","unstructured":"ISO. 2016. Information technology --- Cloud computing --- Service level agreement (SLA) framework and technology --- Part 1: Overview and concepts. Standard . International Organization for Standardization , International Electrotechnical Commission. Final Draft. ISO. 2016. Information technology --- Cloud computing --- Service level agreement (SLA) framework and technology --- Part 1: Overview and concepts. Standard. International Organization for Standardization, International Electrotechnical Commission. Final Draft.","key":"e_1_3_2_1_19_1"},{"volume-title":"Information technology --- Cloud computing --- Service level agreement (SLA) framework --- Part 4: Components of Security and of Protection of PII. Standard","author":"ISO.","unstructured":"ISO. 2017. Information technology --- Cloud computing --- Service level agreement (SLA) framework --- Part 4: Components of Security and of Protection of PII. Standard . International Organization for Standardization , International Electrotechnical Commission. Committee Draft. ISO. 2017. Information technology --- Cloud computing --- Service level agreement (SLA) framework --- Part 4: Components of Security and of Protection of PII. Standard. International Organization for Standardization, International Electrotechnical Commission. Committee Draft.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/646766.704278"},{"key":"e_1_3_2_1_23_1","first-page":"25","article-title":"The IITM Model: a Simple and Expressive Model for Universal Composability","volume":"2013","author":"K\u00fcsters Ralf","year":"2013","unstructured":"Ralf K\u00fcsters and Max Tuengerthal . 2013 . The IITM Model: a Simple and Expressive Model for Universal Composability . IACR Cryptology ePrint Archive 2013 (2013), 25 . Ralf K\u00fcsters and Max Tuengerthal. 2013. The IITM Model: a Simple and Expressive Model for Universal Composability. IACR Cryptology ePrint Archive 2013 (2013), 25.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the HCI International 2018-20th International Conference on Human-Computer Interaction, Las Vegas, USA","author":"L\u00e4nger Thomas","year":"2018","unstructured":"Thomas L\u00e4nger , Ala Alaqra , Simone Fischer H\u00fcbner , Erik Framner , John-S\u00f6ren Pettersson , and Katrin Riemer . 2018 . HCI Patterns for Cryptographically Equipped Cloud Services. Springer LNCS , Proceedings of the HCI International 2018-20th International Conference on Human-Computer Interaction, Las Vegas, USA (2018). Thomas L\u00e4nger, Ala Alaqra, Simone Fischer H\u00fcbner, Erik Framner, John-S\u00f6ren Pettersson, and Katrin Riemer. 2018. HCI Patterns for Cryptographically Equipped Cloud Services. Springer LNCS, Proceedings of the HCI International 2018-20th International Conference on Human-Computer Interaction, Las Vegas, USA (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Privacy Technologies and Policy - 4th Annual Privacy Forum (APE","author":"L\u00e4nger Thomas","year":"2016","unstructured":"Thomas L\u00e4nger , Henrich C. P\u00f6hls , and Solange Ghernaouti . 2016. Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds . In Privacy Technologies and Policy - 4th Annual Privacy Forum (APE 2016 ). Springer . http:\/\/henrich.poehls.com\/papers\/2016_LaengerPoehlsGhernaouti_SecurityPatternsForClouds_ENISA-APF.pdf This is a pre-print. Thomas L\u00e4nger, Henrich C. P\u00f6hls, and Solange Ghernaouti. 2016. Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. In Privacy Technologies and Policy - 4th Annual Privacy Forum (APE 2016). Springer. http:\/\/henrich.poehls.com\/papers\/2016_LaengerPoehlsGhernaouti_SecurityPatternsForClouds_ENISA-APF.pdf This is a pre-print."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/CloudCom.2015.71"},{"volume-title":"PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 733--741","author":"Loruenser Thomas","unstructured":"Thomas Loruenser , Daniel Slamanig , Thomas L\u00e4nger , and Henrich C. P\u00f6hls . 2016 . PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 733--741 . Thomas Loruenser, Daniel Slamanig, Thomas L\u00e4nger, and Henrich C. P\u00f6hls. 2016. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 733--741.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"Agile cryptographic solutions for the cloud. e & i Elektrotechnik und Informationstechnik 134, 7 (nov","author":"Lor\u00fcnser Thomas","year":"2017","unstructured":"Thomas Lor\u00fcnser , Stephan Krenn , Christoph Striecks , and Thomas L\u00e4nger . 2017. Agile cryptographic solutions for the cloud. e & i Elektrotechnik und Informationstechnik 134, 7 (nov 2017 ), 364--369. Thomas Lor\u00fcnser, Stephan Krenn, Christoph Striecks, and Thomas L\u00e4nger. 2017. Agile cryptographic solutions for the cloud. e & i Elektrotechnik und Informationstechnik 134, 7 (nov 2017), 364--369."},{"volume-title":"E-Democracy \u00e2\u0102\u015e Citizen Rights in the World of the New Computing Paradigms, Sokratis K Katsikas and Alexander B Sideridis (Eds.). Communications in Computer and Information Science","author":"Lor\u00fcnser Thomas","unstructured":"Thomas Lor\u00fcnser , Thomas L\u00e4nger , and Daniel Slamanig . 2015. Cloud Security and Privacy by Design . In E-Democracy \u00e2\u0102\u015e Citizen Rights in the World of the New Computing Paradigms, Sokratis K Katsikas and Alexander B Sideridis (Eds.). Communications in Computer and Information Science , Vol. 570 . Springer International Publishing , 202--206. Thomas Lor\u00fcnser, Thomas L\u00e4nger, and Daniel Slamanig. 2015. Cloud Security and Privacy by Design. In E-Democracy \u00e2\u0102\u015e Citizen Rights in the World of the New Computing Paradigms, Sokratis K Katsikas and Alexander B Sideridis (Eds.). Communications in Computer and Information Science, Vol. 570. Springer International Publishing, 202--206.","key":"e_1_3_2_1_29_1"},{"volume-title":"Communications in Computer and Information Science","author":"Lor\u00fcnser Thomas","unstructured":"Thomas Lor\u00fcnser , CharlesBastos Rodriguez , Denise Demirel , Simone Fischer-H\u00fcbner , Thomas Gro\u00df , Thomas L\u00e4nger , Mathieu des Noes , Henrich C. P\u00f6hls , Boris Rozenberg , and Daniel Slamanig . 2015. Towards a New Paradigm for Privacy and Security in Cloud Services . In Cyber Security and Privacy, Frances Cleary and Massimo Felici (Eds.). Communications in Computer and Information Science , Vol. 530 . Springer International Publishing , 14--25. Thomas Lor\u00fcnser, CharlesBastos Rodriguez, Denise Demirel, Simone Fischer-H\u00fcbner, Thomas Gro\u00df, Thomas L\u00e4nger, Mathieu des Noes, HenrichC. P\u00f6hls, Boris Rozenberg, and Daniel Slamanig. 2015. Towards a New Paradigm for Privacy and Security in Cloud Services. In Cyber Security and Privacy, Frances Cleary and Massimo Felici (Eds.). Communications in Computer and Information Science, Vol. 530. Springer International Publishing, 14--25.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","article-title":"A New Architecture for Developing Cryptographic Cloud Services","volume":"2016","author":"Lor\u00fcnser Thomas","year":"2016","unstructured":"Thomas Lor\u00fcnser , Daniel Slamanig , Thomas L\u00e4nger , and Henrich C P\u00f6hls . 2016 . A New Architecture for Developing Cryptographic Cloud Services . ERCIM News 2016 , 106 (2016). http:\/\/ercim-news.ercim.eu\/enl06\/special\/a-new-architecture-for-developing-cryptographic-cloud-services Thomas Lor\u00fcnser, Daniel Slamanig, Thomas L\u00e4nger, and Henrich C P\u00f6hls. 2016. A New Architecture for Developing Cryptographic Cloud Services. ERCIM News 2016, 106 (2016). http:\/\/ercim-news.ercim.eu\/enl06\/special\/a-new-architecture-for-developing-cryptographic-cloud-services","journal-title":"ERCIM News"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/MS.2002.1049391"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/MSECP.2004.1281254"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/3133956.3134082"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.5220\/0005785501370146"},{"key":"e_1_3_2_1_36_1","volume-title":"P\u00f6hls and Focke H\u00f6hne","author":"Henrich","year":"2011","unstructured":"Henrich C. P\u00f6hls and Focke H\u00f6hne . 2011 . The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. In Revised Selected Papers from the 7th International Workshop on Security and Trust Management (STM 2011) (LNCS), Vol. 7170 . Springer , 175--192. Henrich C. P\u00f6hls and Focke H\u00f6hne. 2011. The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. In Revised Selected Papers from the 7th International Workshop on Security and Trust Management (STM 2011) (LNCS), Vol. 7170. Springer, 175--192."},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Einsetzbare Kryptografie f\u00fcr die Cloud","volume":"17","author":"P\u00f6hls Henrich C.","year":"2017","unstructured":"Henrich C. P\u00f6hls and Thomas L\u00e4nger . 2017 . Einsetzbare Kryptografie f\u00fcr die Cloud . Zeitschrift f\u00fcr Datenrecht und Informationssicherheit (digma) 17 , 1 (Mar. 2017), 78--81. Henrich C. P\u00f6hls and Thomas L\u00e4nger. 2017. Einsetzbare Kryptografie f\u00fcr die Cloud. Zeitschrift f\u00fcr Datenrecht und Informationssicherheit (digma) 17, 1 (Mar. 2017), 78--81.","journal-title":"Zeitschrift f\u00fcr Datenrecht und Informationssicherheit (digma)"},{"volume-title":"Security Patterns - Integrating Security and Systems Engineering","author":"Schumacher Markus","unstructured":"Markus Schumacher , Eduardo Fernandez-Buglioni , Duane Hybertson , Frank Buschmann , and Peter Sommerlad . 2006. Security Patterns - Integrating Security and Systems Engineering . John Wiley & Sons, Ltd. West Sussex, England. Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad. 2006. Security Patterns - Integrating Security and Systems Engineering. John Wiley & Sons, Ltd. West Sussex, England.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","volume-title":"Still wrong use of pairings in cryptography. Appl. Math. Comput. 333 (sep","author":"Uzunkol Osmanbey","year":"2018","unstructured":"Osmanbey Uzunkol and Mehmet Sab\u00c4\u015br Kiraz . 2018. Still wrong use of pairings in cryptography. Appl. Math. Comput. 333 (sep 2018 ), 467--479. Osmanbey Uzunkol and Mehmet Sab\u00c4\u015br Kiraz. 2018. Still wrong use of pairings in cryptography. Appl. Math. Comput. 333 (sep 2018), 467--479."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of 3rd International Academic Conference of Young Scientists on Law & Psychology 2015 (LPS","author":"van Geelkerken Frank W.J.","year":"2015","unstructured":"Frank W.J. van Geelkerken , Henrich C. P\u00f6hls , and Simone Fischer-H\u00fcbner . 2015 . The legal status of malleable- and functional signatures in light of Regulation (EU) No 910\/2014 . In Proc. of 3rd International Academic Conference of Young Scientists on Law & Psychology 2015 (LPS 2015). L'viv Polytechnic Publishing House, 404--410. https:\/\/drive.google.com\/file\/d\/0B-Yu3Ni9z3PXM2lBajhCXzhoWk0\/view Frank W.J. van Geelkerken, Henrich C. P\u00f6hls, and Simone Fischer-H\u00fcbner. 2015. The legal status of malleable- and functional signatures in light of Regulation (EU) No 910\/2014. In Proc. of 3rd International Academic Conference of Young Scientists on Law & Psychology 2015 (LPS 2015). L'viv Polytechnic Publishing House, 404--410. https:\/\/drive.google.com\/file\/d\/0B-Yu3Ni9z3PXM2lBajhCXzhoWk0\/view"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1016\/j.cose.2004.09.011"}],"event":{"sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"acronym":"ARES 2018","name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233765","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3233765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:13Z","timestamp":1750212493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233765"}},"subtitle":["Embedding Cryptographic Engineering into Secure Software Development Lifecycle"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":40,"alternative-id":["10.1145\/3230833.3233765","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3233765","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}