Skip to main content
. 2014 Mar 12;5(4):463–472. doi: 10.1016/j.jare.2014.03.001

Table 6.

The comparison results with SEPP methodology.

SEPP methodology results
Security requirements:
SR1: Access is granted for the authentic user and access is denied for the Malicious subject
SR2: Malicious subject should not be able to derive sent data and received data during data transmission
SR3: Sent data equals Received data or if not, a modification by Malicious subject is detected using Transmitted data



The proposed methodology results
Security requirements:
SR1: The security validation state is accepted only if the user using identity is the one he claims to be
SR2: Transmitted screen data should be not understandable by attackers
SR3: Any modification to Transmitted screen data should be detected
SR4: Screen Data should be available for sending and displaying
SR5: Screen data changing and sending by users should be logged