To main content

Covering Your Assets in Software Engineering

Covering Your Assets in Software Engineering

Category
Academic lecture
Abstract
Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.   Presented by Martin Gilje Jaatun
Language
English
Affiliation
  • SINTEF Digital / Software Engineering, Safety and Security
Presented at
2nd International Workshop on Secure Software Engineering. ARES 2008
Place
Barcelona
Date
04.03.2008 - 07.03.2008
Organizer
DEXA
Year