Mitigating the authentication vulnerabilities in Web applications through security requirements | IEEE Conference Publication | IEEE Xplore