본문 바로가기
  • Home

A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2014, 19(7), pp.87-93
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

Seong-Yoon Shin ORD ID 1

1군산대학교

Accredited

ABSTRACT

In analysis as the first step of S/W development, security requirements of identification andauthentication, ID and password management, authentication process, authentication method, ete. should be defined. Identification is to uniquely identify certain users and applications running ona certain system. Authentication means the function to determine true or false users andapplications in some cases. This paper is to suggest the security requirements for identificationand authentication in analysis step. Firstly, individual ID should be uniquely identified. Thesecond element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the securityrequirements for the step of identification and authentication have been explained through severalpractical implementation methods.

Citation status

* References for papers published after 2023 are currently being built.