Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria 


Vol. 15,  No. 2, pp. 125-132, Apr.  2008
10.3745/KIPSTC.2008.15.2.125


PDF
  Abstract

As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.

  Statistics


  Cite this article

[IEEE Style]

J. H. Han, B. H. Lee, S. M. Hong, S. H. Kim, D. H. Won, S. J. Kim, "Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria," The KIPS Transactions:PartC, vol. 15, no. 2, pp. 125-132, 2008. DOI: 10.3745/KIPSTC.2008.15.2.125.

[ACM Style]

Jeong Hoon Han, Byung Hee Lee, Su Min Hong, Seung Hyun Kim, Dong Ho Won, and Seung Joo Kim. 2008. Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria. The KIPS Transactions:PartC, 15, 2, (2008), 125-132. DOI: 10.3745/KIPSTC.2008.15.2.125.