To main content

Covering Your Assets in Software Engineering

Abstract

Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.

Category

Academic chapter/article/Conference paper

Language

English

Author(s)

Affiliation

  • SINTEF Digital / Software Engineering, Safety and Security

Year

2008

Publisher

IEEE (Institute of Electrical and Electronics Engineers)

Book

Proceedings of the Third International Conference on Availability, Reliability and Security

ISBN

9780769531021

Page(s)

1172 - 1179

View this publication at Cristin