Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it. Beznosov, K. In First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, volume 31, 2003. bibtex @inproceedings{beznosov2003extreme,
title={Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it},
author={Beznosov, Konstantin},
booktitle={First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA},
volume={31},
year={2003}
}
Downloads: 0
{"_id":"gie55ThiNXg7maxgx","bibbaseid":"beznosov-extremesecurityengineeringonemployingxppracticestoachievegoodenoughsecuritywithoutdefiningit-2003","author_short":["Beznosov, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it","author":[{"propositions":[],"lastnames":["Beznosov"],"firstnames":["Konstantin"],"suffixes":[]}],"booktitle":"First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA","volume":"31","year":"2003","bibtex":"@inproceedings{beznosov2003extreme,\n title={Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it},\n author={Beznosov, Konstantin},\n booktitle={First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA},\n volume={31},\n year={2003}\n}\n\n","author_short":["Beznosov, K."],"key":"beznosov2003extreme","id":"beznosov2003extreme","bibbaseid":"beznosov-extremesecurityengineeringonemployingxppracticestoachievegoodenoughsecuritywithoutdefiningit-2003","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/M8Cusi6NcZNqEmNN7","dataSources":["gdEygGa34uWkjynDQ","ikcgcNLWkPYd7asYj"],"keywords":[],"search_terms":["extreme","security","engineering","employing","practices","achieve","good","enough","security","without","defining","beznosov"],"title":"Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it","year":2003}