In this article, the authors discuss how model-based engineering (MBE) offers a means to design, develop, analyze, and maintain a complex system architecture.
In this book chapter, the authors discuss modern principles of software assurance and identify a number of relevant process models, frameworks, and best practices.
In this paper, the authors highlight efforts to address the principles of software assurance and its educational curriculum.
In this report, the authors describe the current state of the practice and emerging trends in software assurance measurement.
In this paper, the authors detail the validation of a teaching model for security requirements engineering that ensures that security is built into software.
In this paper, Dan Shoemaker presents the standard process for acquiring software products and services in business.
In this paper, the authors introduce the concept of standardized third-party certification of supplier process capability.
In this paper, the authors discuss the results of comparing the Common Body of Knowledge for Secure Software Assurance with traditional computing disciplines.
In this paper, Dan Shoemaker describes existing professional certifications in information assurance and emerging certifications for secure software assurance.
In this paper, the authors present IT valuation models that represent the most commonly accepted approaches to the valuation of IT and IT processes.
Topics: Incident Management
In this paper, the authors characterize the current state of secure software assurance work and suggest future directions.
In this paper, the authors describe a software assurance competency model that can be used by professionals to improve their software assurance skills.
In this paper, the authors propose a set of Supply Chain Risk Management (SCRM) activities and practices for Information and Communication Technologies (ICT).
In this paper, the authors describe three educational initiatives in support of software assurance education.
In this article, the authors demonstrate how a true cost/benefit for secure software can be derived.
In this paper, the authors describe two efforts that support national cybersecurity education goals.
In this paper, the authors highlight efforts underway to address our society's growing dependence on software and the need for effective software assurance.
In this paper, Dan Shoemaker presents a standard approach to increasing the security capability of a typical IT function.
In this preface, the guest editors of this special edition provide a context for the articles that comprise the issue.
In this book chapter, the authors present a measurement model with seven principles that capture the fundamental managerial and technical concerns of development and sustainment.
Topics: Software Assurance
In this report, the authors examine how the Master of Software Assurance Reference Curriculum can be used for a Master of Science in Information Systems.
This course teaches the fundamental organizing principles and control techniques delineated by the ISO/IEEE 12207 and the ISO 15288 standards.
Topics: Cybersecurity Engineering
In this preface, the authors describe the rest of the issue, which discusses how to bring software security education to the mainstream.
In this report, the authors provide advice for those making a business case for building software assurance into software products during software development.
Topics: Cybersecurity Engineering
In this book chapter, the authors describe methods of incorporating security requirements engineering into software engineering courses and curricula.