Logging and verification

Software reuse repository contains valuable software engineering knowledge and software code. The system must be secure enough. A user could invoke the system by typing the name of the system, then he/she could log into the system, the user must enter his/her password (currently, the system supports one level of system security, a multi level of security will be implemented in the future). The system will verify the user by checking his password with the user description table. The description table contains personal information like user name, ID number, organization, division, and electronic address. After the system verify the user, he/she will be given the permission to use the system (the system will display the main menu).