Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°ÀÇ Ãë¾à¼º ºÐ¼® ¹× Æò°¡±âÁØ Á¦¾È |
¿µ¹®Á¦¸ñ(English Title) |
Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria |
ÀúÀÚ(Author) |
ÇÑÁ¤ÈÆ
À̺´Èñ
È«¼ö¹Î
±è½ÂÇö
¿øµ¿È£
±è½ÂÁÖ
Jeonghoon Han
Byunghee Lee
Sumin Hong
Seunghyun Kim
Dongho Won
Seungjoo Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 15-C NO. 02 PP. 0125 ~ 0132 (2008. 04) |
Çѱ۳»¿ë (Korean Abstract) |
ÀÎÅÍ³Ý ±â¼úÀÇ ¹ß´Þ¿¡ µû¶ó ¿Â¶óÀÎ ¼ºñ½º¸¦ ÀÌ¿ëÇϱâ À§ÇØ °³ÀÎÀÌ °ü¸®ÇØ¾ß ÇÒ ¾ÆÀ̵ðÀÇ ¼ö°¡ Áõ°¡ÇÏ¿´°í, »ç¿ëÀÚÀÇ ¾ÆÀ̵ð¿Í Æнº¿öµå¸¦ ¾ÈÀüÇÏ°í Æí¸®ÇÏ°Ô °ü¸®ÇÒ ¼ö ÀÖ´Â ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°ÀÌ °³¹ßµÇ¾î »ç¿ëµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ Á¦Ç°¿¡¼ °ü¸®ÀÚ Æнº¿öµå°¡ ³ëÃâµÇ¸é »ç¿ëÀÚÀÇ ¸ðµç Á¤º¸°¡ ³ëÃâµÉ ¼ö ÀÖ´Â À§ÇèÀÌ ÀÖ´Ù. µû¶ó¼ ÇöÀç »ó¿ë Á¦Ç°ÀÇ Ãë¾à¼º ºÐ¼®À» ÅëÇØ º¸¾È¿ä±¸»çÇ×À» µµÃâÇÏ°í, ¾ÈÀüÇÑ ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç° °³¹ßÀÇ ÁöħÀ¸·Î »ç¿ëµÉ Æò°¡±âÁØÀÌ ÇÊ¿äÇÏ´Ù. º» ³í¹®¿¡¼´Â µµÃâµÈ º¸¾È¿ä±¸»çÇ×À» ¹ÙÅÁÀ¸·Î, ¾ÈÀüÇÑ ¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°À» À§ÇÑ Æò°¡ ±âÁØÀ» Á¦¾ÈÇÑ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution. |
Å°¿öµå(Keyword) |
¾ÆÀ̵ð/Æнº¿öµå ÅëÇÕ °ü¸® Á¦Ç°
µðÁöÅÐ ID °ü¸® ±â¼ú
Æò°¡ ±âÁØ
ID/PW Management Solution
Digital Identity Management
Evaluation Criteria
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|