This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session047"
From OWASP
Abraham Kang (talk | contribs) |
Abraham Kang (talk | contribs) |
||
Line 126: | Line 126: | ||
| summit_ws_logo = | | summit_ws_logo = | ||
| summit_session_name = Security Refactoring | | summit_session_name = Security Refactoring | ||
− | | summit_session_url = | + | | summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session047 |
| mailing_list = | | mailing_list = | ||
Revision as of 04:59, 3 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
Security Refactoring | ||||||
---|---|---|---|---|---|---|
Please see/use the 'discussion' page for more details about this Working Session | ||||||
Working Sessions Operational Rules - Please see here the general frame of rules. |
WORKING SESSION IDENTIFICATION | ||||||
---|---|---|---|---|---|---|
Short Work Session Description | Most developers will read security guide information and cannot relate because they usually have not written code in a secure manner. This session looks to present security coding bad practices as "bad smells" in a similar format to Martin Fowler's Refactoring: Improving the Design of Existing Code. By presenting bad coding examples, we are hoping that developers reading the information think, "Oh, crap, I have similar code running in production and I need to utilize the solution provided (using ESAPI of course) to fix my mistake". | |||||
Related Projects (if any) |
| |||||
Email Contacts & Roles | Chair Abraham Kang @ |
Operational Manager Abraham Kang @ |
Mailing list Subscription Page |
WORKING SESSION SPECIFICS | ||||||
---|---|---|---|---|---|---|
Objectives | ||||||
Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees |
|
---|
WORKING SESSION OPERATIONAL RESOURCES | ||||||
---|---|---|---|---|---|---|
Projector, whiteboards, markers, Internet connectivity, power |
|
---|
WORKING SESSION ADDITIONAL DETAILS | ||||||
---|---|---|---|---|---|---|
Looking to discuss organization of code examples, format for each "Security Refactoring" and secure solutions. |
WORKING SESSION OUTCOMES / DELIVERABLES | ||
---|---|---|
Proposed by Working Group | Approved by OWASP Board | |
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. |
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
WORKING SESSION PARTICIPANTS | ||||||
---|---|---|---|---|---|---|
Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
Abraham Kang @ |
|
| ||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
|