@article{ART001898123},
author={SeongYoon Shin},
title={A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2014},
volume={19},
number={7},
pages={87-93}
TY - JOUR
AU - SeongYoon Shin
TI - A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis
JO - Journal of The Korea Society of Computer and Information
PY - 2014
VL - 19
IS - 7
PB - The Korean Society Of Computer And Information
SP - 87
EP - 93
SN - 1598-849X
AB - In analysis as the first step of S/W development, security requirements of identification andauthentication, ID and password management, authentication process, authentication method, ete.
should be defined. Identification is to uniquely identify certain users and applications running ona certain system. Authentication means the function to determine true or false users andapplications in some cases. This paper is to suggest the security requirements for identificationand authentication in analysis step. Firstly, individual ID should be uniquely identified. Thesecond element is to apply the length limitations, combination and periodic changes of passwords.
The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the securityrequirements for the step of identification and authentication have been explained through severalpractical implementation methods.
KW - Analysis Step;Identification;Authentication;ID;Password;Security Requirements
DO -
UR -
ER -
SeongYoon Shin. (2014). A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis. Journal of The Korea Society of Computer and Information, 19(7), 87-93.
SeongYoon Shin. 2014, "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis", Journal of The Korea Society of Computer and Information, vol.19, no.7 pp.87-93.
SeongYoon Shin "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis" Journal of The Korea Society of Computer and Information 19.7 pp.87-93 (2014) : 87.
SeongYoon Shin. A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis. 2014; 19(7), 87-93.
SeongYoon Shin. "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis" Journal of The Korea Society of Computer and Information 19, no.7 (2014) : 87-93.
SeongYoon Shin. A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis. Journal of The Korea Society of Computer and Information, 19(7), 87-93.
SeongYoon Shin. A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis. Journal of The Korea Society of Computer and Information. 2014; 19(7) 87-93.
SeongYoon Shin. A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis. 2014; 19(7), 87-93.
SeongYoon Shin. "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis" Journal of The Korea Society of Computer and Information 19, no.7 (2014) : 87-93.