• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°ÀÇ Ãë¾à¼º ºÐ¼® ¹× Æò°¡±âÁØ Á¦¾È
¿µ¹®Á¦¸ñ(English Title) Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria
ÀúÀÚ(Author) ÇÑÁ¤ÈÆ   À̺´Èñ   È«¼ö¹Î   ±è½ÂÇö   ¿øµ¿È£   ±è½ÂÁÖ   Jeonghoon Han   Byunghee Lee   Sumin Hong   Seunghyun Kim   Dongho Won   Seungjoo Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 15-C NO. 02 PP. 0125 ~ 0132 (2008. 04)
Çѱ۳»¿ë
(Korean Abstract)
ÀÎÅÍ³Ý ±â¼úÀÇ ¹ß´Þ¿¡ µû¶ó ¿Â¶óÀÎ ¼­ºñ½º¸¦ ÀÌ¿ëÇϱâ À§ÇØ °³ÀÎÀÌ °ü¸®ÇØ¾ß ÇÒ ¾ÆÀ̵ðÀÇ ¼ö°¡ Áõ°¡ÇÏ¿´°í, »ç¿ëÀÚÀÇ ¾ÆÀ̵ð¿Í Æнº¿öµå¸¦ ¾ÈÀüÇÏ°í Æí¸®ÇÏ°Ô °ü¸®ÇÒ ¼ö ÀÖ´Â ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°ÀÌ °³¹ßµÇ¾î »ç¿ëµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ Á¦Ç°¿¡¼­ °ü¸®ÀÚ Æнº¿öµå°¡ ³ëÃâµÇ¸é »ç¿ëÀÚÀÇ ¸ðµç Á¤º¸°¡ ³ëÃâµÉ ¼ö ÀÖ´Â À§ÇèÀÌ ÀÖ´Ù. µû¶ó¼­ ÇöÀç »ó¿ë Á¦Ç°ÀÇ Ãë¾à¼º ºÐ¼®À» ÅëÇØ º¸¾È¿ä±¸»çÇ×À» µµÃâÇÏ°í, ¾ÈÀüÇÑ ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç° °³¹ßÀÇ ÁöħÀ¸·Î »ç¿ëµÉ Æò°¡±âÁØÀÌ ÇÊ¿äÇÏ´Ù. º» ³í¹®¿¡¼­´Â µµÃâµÈ º¸¾È¿ä±¸»çÇ×À» ¹ÙÅÁÀ¸·Î, ¾ÈÀüÇÑ ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°À» À§ÇÑ Æò°¡ ±âÁØÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.
Å°¿öµå(Keyword) ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°   µðÁöÅÐ ID °ü¸® ±â¼ú   Æò°¡ ±âÁØ   ID/PW Management Solution   Digital Identity Management   Evaluation Criteria  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå