Authentication Modeling with Five Generic Processes

Abstract

Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.

Authors and Affiliations

Sabah Al-Fedaghi, MennatAllah Bayoumi

Keywords

Related Articles

Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications

Accurate and efficient estimators for End to End delay (E2EPD) plays a significant and critical role in Quality of Service (QoS) provisioning in Internet of Things (IoT) wireless communications. The purpose of this paper...

A Novel Position-based Sentiment Classification Algorithm for Facebook Comments

With the popularisation of social networks, people are now more at ease to share their thoughts, ideas, opinions and views about all kinds of topics on public platforms. Millions of users are connected each day on social...

Training Difficulties in Deductive Methods of Verification and Synthesis of Program

The article analyzes the difficulties which Bachelor Degree in Informatics and Computer Sciences students encounter in the process of being trained in applying deductive methods of verification and synthesis of procedura...

Improving Routing Performances to Provide Internet Connectivity in VANETs over IEEE 802.11p

In the intelligent transportation systems, many applications and services could be offered in the road via Internet. Providing these applications over vehicular ad hoc network (VANETs) technology may require good perform...

GDPI: Signature based Deep Packet Inspection using GPUs

Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats. The signature based Network Intrusion and etection System (NIDS) works on packet inspection and...

Download PDF file
  • EP ID EP645847
  • DOI 10.14569/IJACSA.2019.0100947
  • Views 102
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, MennatAllah Bayoumi (2019). Authentication Modeling with Five Generic Processes. International Journal of Advanced Computer Science & Applications, 10(9), 360-370. https://europub.co.uk/articles/-A-645847