DocumentCode :
1566726
Title :
Covering Your Assets in Software Engineering
Author :
Jaatun, Martin Gilje ; Tndel, I.A.
Author_Institution :
Dept. of Software Eng., SINTEF Inf. & Commun. Technol., Trondheim
fYear :
2008
Firstpage :
1172
Lastpage :
1179
Abstract :
Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.
Keywords :
security of data; software engineering; security requirement elicitation technique; software engineering project; Application software; Availability; Communications technology; Computer security; Information security; Legislation; Protection; Risk analysis; Software engineering; Software safety; Assets; security requirements;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-0-7695-3102-1
Type :
conf
DOI :
10.1109/ARES.2008.8
Filename :
4529476
Link To Document :
بازگشت