Showing 1 - 10 of 15 results for the Author - dan shoemaker (university of detroit mercy) , Type - White Paper
In this paper, the authors present IT valuation models that represent the most commonly accepted approaches to the valuation of IT and IT processes.
In this paper, the authors detail the validation of a teaching model for security requirements engineering that ensures that security is built into software.
In this paper, the authors discuss the results of comparing the Common Body of Knowledge for Secure Software Assurance with traditional computing disciplines.
In this paper, the authors characterize the current state of secure software assurance work and suggest future directions.
In this paper, the authors highlight efforts to address the principles of software assurance and its educational curriculum.
In this paper, the authors describe two efforts that support national cybersecurity education goals.
In this paper, the authors propose a set of Supply Chain Risk Management (SCRM) activities and practices for Information and Communication Technologies (ICT).
In this paper, the authors describe three educational initiatives in support of software assurance education.
In this paper, the authors highlight efforts underway to address our society's growing dependence on software and the need for effective software assurance.
In this paper, the authors describe a software assurance competency model that can be used by professionals to improve their software assurance skills.