Authentication Modeling with Five Generic Processes

Abstract

Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.

Authors and Affiliations

Sabah Al-Fedaghi, MennatAllah Bayoumi

Keywords

Related Articles

PaMSA: A Parallel Algorithm for the Global Alignment of Multiple Protein Sequences

Multiple sequence alignment (MSA) is a well-known problem in bioinformatics whose main goal is the identification of evolutionary, structural or functional similarities in a set of three or more related genes or proteins...

GASolver-A Solution to Resource Constrained Project Scheduling by Genetic Algorithm

The Resource Constrained Scheduling Problem (RCSP) represents an important research area. Not only exact solution but also many heuristic methods have been proposed to solve RCPSP (Resource Constrained Project Scheduling...

Malware Detection in Cloud Computing

Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effect of traditional host based antivirus is questionable. Antivirus software fails...

Double Authentication Model using Smartphones to Enhance Student on-Campus Network Access

Computers are widely used by all universities to provide network access to students. Therefore, the securities of these computers play a major role in protecting the network. In light of that, a strong access control is...

Energy Management Strategy of a PV/Fuel Cell/Supercapacitor Hybrid Source Feeding an off-Grid Pumping Station

This work aims to develop an accurate energy management strategy for a hybrid renewable energy system feeding a pumping station. A developed model under Simulink environment is used to compare the performance of the pump...

Download PDF file
  • EP ID EP645847
  • DOI 10.14569/IJACSA.2019.0100947
  • Views 107
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, MennatAllah Bayoumi (2019). Authentication Modeling with Five Generic Processes. International Journal of Advanced Computer Science & Applications, 10(9), 360-370. https://europub.co.uk/articles/-A-645847