Authentication Modeling with Five Generic Processes
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.
Authors and Affiliations
Sabah Al-Fedaghi, MennatAllah Bayoumi
Smoothness Measure for Image Fusion in Discrete Cosine Transform
The aim of image fusion is to generate high-quality images using information from source images. The fused image contains more information than any of the source images. Image fusion using transforms is more effective th...
Comparison of Agile Method and Scrum Method with Software Quality Affecting Factors
The software industry used software development lifecycle (SDLC) to design, develop, produce high quality, reliable and cost-effective software products. To develop an application, project team used some methodology whic...
Application of multi regressive linear model and neural network for wear prediction of grinding mill liners
The liner of an ore grinding mill is a critical component in the grinding process, necessary for both high metal recovery and shell protection. From an economic point of view, it is important to keep mill liners in opera...
Proposal Models for Personalization of e-Learning based on Flow Theory and Artificial Intelligence
This paper presents the comparison of the results of two models for the personalization of learning resources sequences in a Massive Online Open Course (MOOC). The compared models are very similar and differ just in the...
Reliable Multicast Transport Protocol: RMTP
- This paper presents the design, implementation, and performance of a reliable multicast transport protocol (RMTP). RMTP is based on a hierarchical structure in which receivers are grouped into local regions or do...