To main content

Covering Your Assets in Software Engineering

Abstract

Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.   Presented by Martin Gilje Jaatun

Category

Academic lecture

Language

English

Author(s)

Affiliation

  • SINTEF Digital / Software Engineering, Safety and Security

Presented at

2nd International Workshop on Secure Software Engineering. ARES 2008

Place

Barcelona

Date

04.03.2008 - 07.03.2008

Organizer

DEXA

Year

2008

View this publication at Cristin