{"title":"Mitigating the authentication vulnerabilities in Web applications through security requirements","authors":"R. Kumar","doi":"10.1109/WICT.2011.6141435","DOIUrl":null,"url":null,"abstract":"To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 World Congress on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2011.6141435","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.