This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session047"
From OWASP
Abraham Kang (talk | contribs) |
Abraham Kang (talk | contribs) |
||
| Line 126: | Line 126: | ||
| summit_ws_logo = | | summit_ws_logo = | ||
| summit_session_name = Security Refactoring | | summit_session_name = Security Refactoring | ||
| − | | summit_session_url = | + | | summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session047 |
| mailing_list = | | mailing_list = | ||
Revision as of 04:59, 3 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Security Refactoring | ||||||
|---|---|---|---|---|---|---|
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Most developers will read security guide information and cannot relate because they usually have not written code in a secure manner. This session looks to present security coding bad practices as "bad smells" in a similar format to Martin Fowler's Refactoring: Improving the Design of Existing Code. By presenting bad coding examples, we are hoping that developers reading the information think, "Oh, crap, I have similar code running in production and I need to utilize the solution provided (using ESAPI of course) to fix my mistake". | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Abraham Kang @ |
Operational Manager Abraham Kang @ |
Mailing list Subscription Page | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives | ||||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| Looking to discuss organization of code examples, format for each "Security Refactoring" and secure solutions. | ||||||
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Abraham Kang @ |
|
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||