This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session047"
From OWASP
Dinis.cruz (talk | contribs) |
Abraham Kang (talk | contribs) |
||
| Line 2: | Line 2: | ||
|- | |- | ||
| − | | summit_session_attendee_name1 = | + | | summit_session_attendee_name1 = Abraham Kang |
| − | | summit_session_attendee_email1 = | + | | summit_session_attendee_email1 = [email protected] |
| summit_session_attendee_username1 = | | summit_session_attendee_username1 = | ||
| summit_session_attendee_company1= | | summit_session_attendee_company1= | ||
| Line 125: | Line 125: | ||
| summit_track_logo = | | summit_track_logo = | ||
| summit_ws_logo = | | summit_ws_logo = | ||
| − | | summit_session_name = | + | | summit_session_name = Security Refactoring |
| summit_session_url = | | summit_session_url = | ||
| mailing_list = | | mailing_list = | ||
| Line 131: | Line 131: | ||
|- | |- | ||
| − | | short_working_session_description= | + | | short_working_session_description=Most developers will read security guide information and cannot relate because they usually have not written code in a secure manner. This session looks to present security coding bad practices as "bad smells" in a similar format to Martin Fowler's ''Refactoring: Improving the Design of Existing Code''. By presenting bad coding examples, we are hoping that developers reading the information think, "Oh, crap, I have similar code running in production and I need to utilize the solution provided (using ESAPI of course) to fix my mistake". |
|- | |- | ||
| − | | related_project_name1 = | + | | related_project_name1 = OWASP Guide |
| related_project_url_1 = | | related_project_url_1 = | ||
| − | | related_project_name2 = | + | | related_project_name2 = ESAPI |
| related_project_url_2 = | | related_project_url_2 = | ||
| Line 176: | Line 176: | ||
|- | |- | ||
| − | | working_session_additional_details = | + | | working_session_additional_details = Looking to discuss organization of code examples, format for each "Security Refactoring" and secure solutions. |
|- | |- | ||
| − | |summit_session_deliverable_name1 = | + | |summit_session_deliverable_name1 = 1. High level Organization of Code Example Smells |
| − | |summit_session_deliverable_name2 = | + | |summit_session_deliverable_name2 = 2. Format to present Security Refactorings |
| − | |summit_session_deliverable_name3 = | + | |summit_session_deliverable_name3 = 3. Solutions and Segmenting of work. |
| − | |summit_session_deliverable_name4 = | + | |summit_session_deliverable_name4 = 4. Scope of initial "Security Refactorings" |
|summit_session_deliverable_name5 = | |summit_session_deliverable_name5 = | ||
| Line 198: | Line 198: | ||
|- | |- | ||
| − | | summit_session_leader_name1 = | + | | summit_session_leader_name1 = Abraham Kang |
| − | | summit_session_leader_email1 = | + | | summit_session_leader_email1 = [email protected] |
| summit_session_leader_username1 = | | summit_session_leader_username1 = | ||
| Line 211: | Line 211: | ||
|- | |- | ||
| − | | operational_leader_name1 = | + | | operational_leader_name1 = Abraham Kang |
| − | | operational_leader_email1 = | + | | operational_leader_email1 = [email protected] |
| operational_leader_username1 = | | operational_leader_username1 = | ||
Revision as of 04:56, 3 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Security Refactoring | ||||||
|---|---|---|---|---|---|---|
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Most developers will read security guide information and cannot relate because they usually have not written code in a secure manner. This session looks to present security coding bad practices as "bad smells" in a similar format to Martin Fowler's Refactoring: Improving the Design of Existing Code. By presenting bad coding examples, we are hoping that developers reading the information think, "Oh, crap, I have similar code running in production and I need to utilize the solution provided (using ESAPI of course) to fix my mistake". | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Abraham Kang @ |
Operational Manager Abraham Kang @ |
Mailing list Subscription Page | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives | ||||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| Looking to discuss organization of code examples, format for each "Security Refactoring" and secure solutions. | ||||||
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Abraham Kang @ |
|
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||