{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:09:18Z","timestamp":1766491758277,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756844","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"22-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Embedding Security Practices into Taxonomy of DevOps Practices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6055-5345","authenticated-orcid":false,"given":"Mohammad","family":"Shameem","sequence":"first","affiliation":[{"name":"Interdisciplinary Research Center for Intelligent Secure Systems, KFUPM, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7318-7644","authenticated-orcid":false,"given":"Mahmood","family":"Niazi","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-5118","authenticated-orcid":false,"given":"Sajjad","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3664-5014","authenticated-orcid":false,"given":"Mohammad","family":"Nadeem","sequence":"additional","affiliation":[{"name":"Computer Science Department, Aligarh Muslim University, Aligarh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Azeem Akbar Kari Smolander Sajjad Mahmood and Ahmed Alsanad. 2022. Toward successful DevSecOps in software development organizations: A decision-making framework. Information and Software Technology 147 (2022) 106894.","DOI":"10.1016\/j.infsof.2022.106894"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMCIS53775.2021.9699240"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Florian Beetz and Simon Harrer. 2021. Gitops: The evolution of devops? IEEE Software 39 4 (2021) 70\u201375.","DOI":"10.1109\/MS.2021.3119106"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Hugo Bruneliere Vittoriano Muttillo Romina Eramo Luca Berardinelli Abel G\u00f3mez Alessandra Bagnato Andrey Sadovykh and Antonio Cicchetti. 2022. AIDOaRt: AI-augmented Automation for DevOps a model-based framework for continuous development in Cyber\u2013Physical Systems. Microprocessors and Microsystems 94 (2022) 104672.","DOI":"10.1016\/j.micpro.2022.104672"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00124"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Andrew Gemino Blaize Horner\u00a0Reich and Pedro\u00a0M Serrador. 2021. Agile traditional and hybrid approaches to project success: is hybrid a poor second choice? Project management journal 52 2 (2021) 161\u2013175.","DOI":"10.1177\/8756972820973082"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Arif\u00a0Ali Khan and Mohammad Shameem. 2020. Multicriteria decision-making taxonomy for DevOps challenging factors using analytical hierarchy process. Journal of software: evolution and process 32 10 (2020) e2263.","DOI":"10.1002\/smr.2263"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Ankur Kumar Mohammad Nadeem and Mohammad Shameem. 2023. Assessment of DevOps Lifecycle Phases and their Role in DevOps Implementation using Best\u2013Worst MCDM. International Journal of Information Technology (2023) 1\u20139.","DOI":"10.1007\/s41870-023-01566-3"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593434.3594241"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28005-5_35"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Steve Mansfield-Devine. 2018. DevOps: finding room for security. Network security 2018 7 (2018) 15\u201320.","DOI":"10.1016\/S1353-4858(18)30070-9"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234188"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Sibonile Moyo and Ernest Mnkandla. 2020. A novel lightweight solo software development methodology with optimum security practices. IEEE Access 8 (2020) 33735\u201333747.","DOI":"10.1109\/ACCESS.2020.2971000"},{"key":"e_1_3_3_1_15_2","unstructured":"Fabiola Moy\u00f3n\u00a0Constante Rafael Soares Maria Pinto-Albuquerque Daniel M\u00e9ndez and Kristian Beckers. 2021. Integration of Security Standards in DevOps Pipelines: An Industry Case Study. arXiv e-prints (2021) arXiv\u20132105."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Poonam Narang and Pooja Mittal. 2022. Performance assessment of traditional software development methodologies and DevOps automation culture. Engineering Technology & Applied Science Research 12 6 (2022) 9726\u20139731.","DOI":"10.48084\/etasr.5315"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-1863-2.ch001"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3475776"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898383"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2896941.2896946"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Ahmed\u00a0E Youssef. 2020. An integrated MCDM approach for cloud service selection based on TOPSIS and BWM. IEEE Access 8 (2020) 71851\u201371865.","DOI":"10.1109\/ACCESS.2020.2987111"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Tianrui Zhou Qinyou Hu Zhihui Hu and Rong Zhen. 2022. An adaptive hyper parameter tuning model for ship fuel consumption prediction under complex maritime environments. Journal of Ocean Engineering and Science 7 3 (2022) 255\u2013263.","DOI":"10.1016\/j.joes.2021.08.007"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","acronym":"EASE Companion '25","location":"Istanbul Turkiye"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:28Z","timestamp":1766491648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":21,"alternative-id":["10.1145\/3727967.3756844","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756844","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}