{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:35:09Z","timestamp":1729647309762,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231415","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"243-248","source":"Crossref","is-referenced-by-count":26,"title":["Software security checklist for the software life cycle"],"prefix":"10.1109","author":[{"given":"D.P.","family":"Gilliam","sequence":"first","affiliation":[]},{"given":"T.L.","family":"Wolfe","sequence":"additional","affiliation":[]},{"given":"J.S.","family":"Sherif","sequence":"additional","affiliation":[]},{"given":"M.","family":"Bishop","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Federal Computer Week","article-title":"Making Software NASA Tough","year":"2002","author":"robinson","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2001.992653"},{"key":"ref12","first-page":"66","article-title":"Component Based Model Checking","author":"powell","year":"0","journal-title":"Proceedings of the 6th World Conference on Integrated Design and Process Technology"},{"article-title":"Building Secure Software: How to avoid Security Problems the Right Way","year":"2001","author":"viega","key":"ref13"},{"article-title":"Writing Secure Code","year":"2002","author":"howard","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/ENABL.2002.1030002","article-title":"Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk","author":"gilliam","year":"2002","journal-title":"Proc 11th IEEE Int Workshops Enabling Technol Infrastructure for Collaborative Enterprises"},{"article-title":"A taxonomy of security tools and sites can be found at","year":"0","author":"davis","key":"ref16"},{"journal-title":"Internet Article http \/\/seclab cs ucdavis edu\/projects\/testing\/papers","article-title":"A Classification Scheme for Security Tools","year":"0","author":"bishop","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2001.953404"},{"key":"ref3","first-page":"141","article-title":"Reducing Software Security Risk Through an Integrated Approach","author":"gilliam","year":"2000","journal-title":"Proc IEEE Int Workshops Enabling Technol Infrastruct Collab Enterp"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/2.755011"},{"journal-title":"Cigital White Paper","article-title":"Building Secure Software: A Difficult But Critical Step in Protecting Your Business","year":"0","author":"mcgraw","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"The Security of Applications: Not All Are Created Equal","author":"jaquith","year":"2002","journal-title":"stake Research Report"},{"article-title":"Computer Security: Art and Science","year":"2002","author":"bishop","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.755011"},{"journal-title":"Technology Review","article-title":"Why Software Is so Bad","year":"2002","author":"mann","key":"ref1"},{"key":"ref9","article-title":"Tangible ROI through Secure Software Engineering","volume":"q4","author":"hoo","year":"2001","journal-title":"Secure Business Quarterly"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231415.pdf?arnumber=1231415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:32Z","timestamp":1497568712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231415","relation":{},"subject":[]}}