A risk-based evaluation of group access control approaches in a healthcare setting
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Advanced secure multimedia services for digital homes
Information Systems Frontiers
Hi-index | 0.00 |
Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be done. In this paper we suggest one specific method that can be used to identify and prioritize assets in any software engineering project.