Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.7.087

A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis  

Shin, Seong-Yoon (Dept. of Computer Information Engineering, Kunsan National University)
Abstract
TIn analysis as the first step of S/W development, security requirements of identification and authentication, ID and password management, authentication process, authentication method, ete. should be defined. Identification is to uniquely identify certain users and applications running on a certain system. Authentication means the function to determine true or false users and applications in some cases. This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the security requirements for the step of identification and authentication have been explained through several practical implementation methods.
Keywords
Analysis Step; Identification; Authentication; ID; Password; Security Requirements;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 http://terms.naver.com/entry.nhn?docId=2073350&cid=208&categoryId=208#TABLE_OF_CONTENT1
2 http://northface32.blog.me/50120464405
3 Daniel D. Lam, "Automated user authentication identification for customized converged services, " US Patent, US 8650628 B2, 2014
4 http://cafe.naver.com/softwarequality/book1621832/758
5 http://www.cyworld.com/B166er/6718585
6 Sviatoslav Voloshynovskiy, Oleksiy Koval, Thierry Pun, "Secure item identification and authentication system and method based on unclonable features," US Patent, US 8705873 B2, 2014
7 Won-Hee Nam, Dea-Woo Park, "A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority, " The Journal of the Korean Institute of Information and Communication Engineering, Vol. 15, No. 6, pp. 1320-1326, 2011. 6   과학기술학회마을   DOI   ScienceOn
8 G. McGraw, "Software assurance for security, " IEEE Computer, vol. 32, pp. 103-105, Apr. 1999.   DOI   ScienceOn
9 Yoon Jae-Ho, "A Study on Identification & Authentication in Enrollment Systems," Thesis of Master of Engineering, Dept. of Graduate School of Sejong University, 2004
10 Yoon-Su Jeong, "Design of Patient Authentication Model in u-healthcare Environment using Coalition ID," Jouranl of Digital Convergence Vol. 11, No. 3, pp. 3-5-310, 2013. 2   과학기술학회마을   DOI
11 Jonghoon Lee, Jungsoo Park, Seung Wook Jung, Souhwan Jung, "The Authentication and Key Management Method based on PUF for Secure USB," J-KICS, Vol. 38B, No. 12, pp. 944-953, 2013.12   과학기술학회마을   DOI   ScienceOn
12 Seong-Yoon Shin, Dai-Hyun Jang, Hyeong-Jin Kim, "A Study on Security Measure of Step-Wise Project," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 4, pp. 771-778, Apr. 2012