首页    期刊浏览 2025年02月17日 星期一
登录注册

文章基本信息

  • 标题:Elicitation and Structured Representation Modeling of Security Requirements for Authentication Vulnerabilities In Web Applications
  • 本地全文:下载
  • 作者:R. Kumar
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2012
  • 卷号:2
  • 期号:6
  • 出版社:S.S. Mishra
  • 摘要:An understanding of the risks to which application will be exposed, can be a good starting point to design and implement secure web applications. Business oriented web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks. In addition, a structured representation model for security requirements is also worked out for user friendliness
  • 关键词:Security Req uirements; Web Application Security; Security in Requirements Phase; Authentication Vulnerabilities.
国家哲学社会科学文献中心版权所有