Title :
Mitigating the authentication vulnerabilities in Web applications through security requirements
Author_Institution :
Dept. of Comput. Sci., Jamia Millia Islamia, New Delhi, India
Abstract :
To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.
Keywords :
Internet; business data processing; data integrity; security of data; authentication vulnerabilities; business centric Web applications; data availability; data confidentiality; data integrity; secure Web applications; security requirements; Authentication; Best practices; Force; Software; Strontium; Web sites; Authentication Vulnerabilities; Security Requirements; Security in Requirements Phase; Web Application Security;
Conference_Titel :
Information and Communication Technologies (WICT), 2011 World Congress on
Conference_Location :
Mumbai
Print_ISBN :
978-1-4673-0127-5
DOI :
10.1109/WICT.2011.6141435