Authentication Modeling with Five Generic Processes
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.
Authors and Affiliations
Sabah Al-Fedaghi, MennatAllah Bayoumi
Evaluation of LoRa-based Air Pollution Monitoring System
Air pollution is a threat to human health and the environment. Pollution caused by harmful gases emitted from car exhausts, factories, forest fires and other sources. Carbon monoxide, nitrogen oxides and carbon dioxide a...
Model Development for Predicting the Occurrence of Benign Laryngeal Lesions using Support Vector Machine: Focusing on South Korean Adults Living in Local Communities
The disease is a consequence of interactions between many complex risk factors, rather than a single cause. Therefore, it is necessary to develop a disease prediction model by using multiple risk factors instead of using...
Measuring Quality of E-Learning and Desaire2Learn in the College of Science and Humanities at Alghat, Majmaah University
E-learning and Desaire2Learn (D2L) system were used in several higher education institutions; the learning satisfaction depends on the quality of the system applied to serve this issue and its importance in users mind. T...
Ontology-Based Clinical Decision Support System for Predicting High-Risk Pregnant Woman
According to Pakistan Medical and Dental Council (PMDC), Pakistan is facing a shortage of approximately 182,000 medical doctors. Due to the shortage of doctors; a large number of lives are in danger especially pregnant w...
AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes
Mobile ad-hoc networks are vulnerable to several types of malicious routing attacks, black hole is one of those, where a malicious node advertise to have the shortest path to all other nodes in the network by the means o...