Covering Your Assets in Software Engineering

  • Authors:
  • Martin Gilje Jaatun;Inger Anne Tøndel

  • Affiliations:
  • -;-

  • Venue:
  • ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.