DocumentCode :
3184303
Title :
Mitigating the authentication vulnerabilities in Web applications through security requirements
Author :
Kumar, R.
Author_Institution :
Dept. of Comput. Sci., Jamia Millia Islamia, New Delhi, India
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
1294
Lastpage :
1298
Abstract :
To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.
Keywords :
Internet; business data processing; data integrity; security of data; authentication vulnerabilities; business centric Web applications; data availability; data confidentiality; data integrity; secure Web applications; security requirements; Authentication; Best practices; Force; Software; Strontium; Web sites; Authentication Vulnerabilities; Security Requirements; Security in Requirements Phase; Web Application Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies (WICT), 2011 World Congress on
Conference_Location :
Mumbai
Print_ISBN :
978-1-4673-0127-5
Type :
conf
DOI :
10.1109/WICT.2011.6141435
Filename :
6141435
Link To Document :
بازگشت