In this paper, the authors detail the validation of a teaching model for security requirements engineering that ensures that security is built into software.
In this paper, the authors discuss the results of comparing the Common Body of Knowledge for Secure Software Assurance with traditional computing disciplines.
In this paper, the authors present IT valuation models that represent the most commonly accepted approaches to the valuation of IT and IT processes.
Topics: Incident Management
In this paper, the authors characterize the current state of secure software assurance work and suggest future directions.
In this article, the authors demonstrate how a true cost/benefit for secure software can be derived.
Topics: Software Assurance
In this report, the authors examine how the Master of Software Assurance Reference Curriculum can be used for a Master of Science in Information Systems.
In this report, the authors provide advice for those making a business case for building software assurance into software products during software development.