Authentication Modeling with Five Generic Processes

Abstract

Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.

Authors and Affiliations

Sabah Al-Fedaghi, MennatAllah Bayoumi

Keywords

Related Articles

Fine-grained Accelerometer-based Smartphone Carrying States Recognition during Walking

Due to the dependency of our daily lives on smartphones, the states of the device have impact on the quality of services offered through a smartphone. In this article, we focus on the carrying states of the device while...

An Investigation and Comparison of Invasive Weed, Flower Pollination and Krill Evolutionary Algorithms

Being inspired by natural phenomena and available biological processes in the nature is one of the difficult methods of problem solving in computer sciences. Evolutionary methods are a set of algorithms that are inspired...

 SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges

 Singular Value Decomposition (SVD) has recently emerged as a new paradigm for processing different types of images. SVD is an attractive algebraic transform for image processing applications. The paper proposes an...

A Comparative Study Between the Capabilities of MySQl Vs. MongoDB as a Back-End for an Online Platform

In this article we present a comparative study between the usage capabilities of MongoDB, a non-relational database, and MySQL’s usage capabilities, a relational database, as a back-end for an online platform. We will al...

Proposed Bilingual Model for Right to Left Language Applications

Using right to left languages (RLL) in software programming requires switching the direction of many components in the interface. Preserving the original interface layout and only changing the language may result in diff...

Download PDF file
  • EP ID EP645847
  • DOI 10.14569/IJACSA.2019.0100947
  • Views 88
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, MennatAllah Bayoumi (2019). Authentication Modeling with Five Generic Processes. International Journal of Advanced Computer Science & Applications, 10(9), 360-370. https://europub.co.uk/articles/-A-645847