{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:06Z","timestamp":1750307286463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,11]],"date-time":"2011-05-11T00:00:00Z","timestamp":1305072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,11]]},"DOI":"10.1145\/1978582.1978589","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T12:59:14Z","timestamp":1305637154000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards benchmarking the trustworthiness of web applications code"],"prefix":"10.1145","author":[{"given":"Afonso Ara\u00fajo","family":"Neto","sequence":"first","affiliation":[{"name":"University of Coimbra, Coimbra, Portugal"}]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"University of Coimbra, Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2011,5,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.31"},{"volume-title":"4th Intl Conf. on Risks and Security of Internet and Systems (CRiSIS2009)","year":"2009","author":"Ara\u00fajo Neto A.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Cenzic. (2009) \"Application security trends report Q3--Q4 2009\". http:\/\/www.cenzic.com.  Cenzic. (2009) \"Application security trends report Q3--Q4 2009\". http:\/\/www.cenzic.com."},{"key":"e_1_3_2_1_4_1","unstructured":"CGI Security. (2010) \"The Cross-Site Scripting (XSS) FAQ\". http:\/\/www.cgisecurity.com\/xss-faq.html.  CGI Security. (2010) \"The Cross-Site Scripting (XSS) FAQ\". http:\/\/www.cgisecurity.com\/xss-faq.html."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.63"},{"key":"e_1_3_2_1_6_1","unstructured":"Gordon L. Loeb M. and Lucyshyn W. and Richardson R. (2006) \"Computer crime and security survey\" Computer Security Institute.  Gordon L. Loeb M. and Lucyshyn W. and Richardson R. (2006) \"Computer crime and security survey\" Computer Security Institute."},{"volume-title":"USA: Morgan Kaufmann Publishers Inc.","year":"1992","author":"Gray J.","key":"e_1_3_2_1_7_1"},{"edition":"2","volume-title":"Howard, M. and LeBlanc, D., \"Writing Secure Code\"","year":"2002","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"IBM. \"IBM Rational AppScan\". http:\/\/www-01.ibm.com\/software\/awdtools\/appscan\/  IBM. \"IBM Rational AppScan\". http:\/\/www-01.ibm.com\/software\/awdtools\/appscan\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Integrigy (2007) \"An Introduction to SQL Injection Attacks for Oracle Developers\". White paper. http:\/\/www.integrigy.com\/security-resources\/whitepapers\/Integrigy_Oracle_SQL_Injection_Attacks.pdf  Integrigy (2007) \"An Introduction to SQL Injection Attacks for Oracle Developers\". White paper. http:\/\/www.integrigy.com\/security-resources\/whitepapers\/Integrigy_Oracle_SQL_Injection_Attacks.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Jansen W. (2009) \"Directions in Security Metrics Research\" NISTIR 7564; http:\/\/csrc.nist.gov\/publications\/nistir\/ir7564\/nistir-7564_metrics-research.pdf  Jansen W. (2009) \"Directions in Security Metrics Research\" NISTIR 7564; http:\/\/csrc.nist.gov\/publications\/nistir\/ir7564\/nistir-7564_metrics-research.pdf"},{"volume-title":"Addison-Wesley Professional","year":"2007","author":"Jaquith A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134744.1134751"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSESS.2009.5068455"},{"key":"e_1_3_2_1_15_1","unstructured":"OWASP. (2010) \"SQL Injection prevention Cheat Sheet\" http:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet  OWASP. (2010) \"SQL Injection prevention Cheat Sheet\" http:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet"},{"key":"e_1_3_2_1_16_1","unstructured":"Seacord R. (2006) \"Secure Coding in C and C++.\" Upper Saddle River NJ: Addison-Wesley.   Seacord R. (2006) \"Secure Coding in C and C++.\" Upper Saddle River NJ: Addison-Wesley."},{"key":"e_1_3_2_1_17_1","unstructured":"Torgerson M. (2007) \"Security Metrics for Communication Systems\" 12th ICCRTS Newport Rhode Island.  Torgerson M. (2007) \"Security Metrics for Communication Systems\" 12th ICCRTS Newport Rhode Island."},{"key":"e_1_3_2_1_18_1","unstructured":"Transaction Processing Performance Council www.tpc.org.  Transaction Processing Performance Council www.tpc.org."},{"key":"e_1_3_2_1_19_1","unstructured":"Web Application Security -- Acunetix Web Vulnerability Scanner. \/www.acunetix.com\/vulnerability-scanner  Web Application Security -- Acunetix Web Vulnerability Scanner. \/www.acunetix.com\/vulnerability-scanner"}],"event":{"name":"EWDC '11: 13th European Workshop on Dependable Computing","acronym":"EWDC '11","location":"Pisa Italy"},"container-title":["Proceedings of the 13th European Workshop on Dependable Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1978582.1978589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1978582.1978589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:37Z","timestamp":1750244377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1978582.1978589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,11]]},"references-count":19,"alternative-id":["10.1145\/1978582.1978589","10.1145\/1978582"],"URL":"https:\/\/doi.org\/10.1145\/1978582.1978589","relation":{},"subject":[],"published":{"date-parts":[[2011,5,11]]},"assertion":[{"value":"2011-05-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}