Authentication Modeling with Five Generic Processes

Abstract

Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.

Authors and Affiliations

Sabah Al-Fedaghi, MennatAllah Bayoumi

Keywords

Related Articles

Smoothness Measure for Image Fusion in Discrete Cosine Transform

The aim of image fusion is to generate high-quality images using information from source images. The fused image contains more information than any of the source images. Image fusion using transforms is more effective th...

Comparison of Agile Method and Scrum Method with Software Quality Affecting Factors

The software industry used software development lifecycle (SDLC) to design, develop, produce high quality, reliable and cost-effective software products. To develop an application, project team used some methodology whic...

Application of multi regressive linear model and neural network for wear prediction of grinding mill liners

The liner of an ore grinding mill is a critical component in the grinding process, necessary for both high metal recovery and shell protection. From an economic point of view, it is important to keep mill liners in opera...

Proposal Models for Personalization of e-Learning based on Flow Theory and Artificial Intelligence

This paper presents the comparison of the results of two models for the personalization of learning resources sequences in a Massive Online Open Course (MOOC). The compared models are very similar and differ just in the...

 Reliable Multicast Transport Protocol: RMTP

 - This paper presents the design, implementation, and performance of a reliable multicast transport protocol (RMTP). RMTP is based on a hierarchical structure in which receivers are grouped into local regions or do...

Download PDF file
  • EP ID EP645847
  • DOI 10.14569/IJACSA.2019.0100947
  • Views 101
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, MennatAllah Bayoumi (2019). Authentication Modeling with Five Generic Processes. International Journal of Advanced Computer Science & Applications, 10(9), 360-370. https://europub.co.uk/articles/-A-645847