Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria


The KIPS Transactions:PartC, Vol. 15, No. 2, pp. 125-132, Apr. 2008
10.3745/KIPSTC.2008.15.2.125,   PDF Download:

Abstract

As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. H. Han, B. H. Lee, S. M. Hong, S. H. Kim, D. H. Won, S. J. Kim, "Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria," The KIPS Transactions:PartC, vol. 15, no. 2, pp. 125-132, 2008. DOI: 10.3745/KIPSTC.2008.15.2.125.

[ACM Style]
Jeong Hoon Han, Byung Hee Lee, Su Min Hong, Seung Hyun Kim, Dong Ho Won, and Seung Joo Kim. 2008. Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria. The KIPS Transactions:PartC, 15, 2, (2008), 125-132. DOI: 10.3745/KIPSTC.2008.15.2.125.