Authentication Modeling with Five Generic Processes
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Conceptual modeling is an essential tool in many fields of study, including security specification in information technology systems. As a model, it restricts access to resources and identifies possible threats to the system. We claim that current modeling languages (e.g., Unified Modeling Language, Business Process Model and Notation) lack the notion of genericity, which refers to a limited set of elementary processes. This paper proposes five generic processes for modeling the structural behavior of a system: creating, releasing, transferring, receiving, and processing. The paper demonstrates these processes within the context of public key infrastructure, biometric, and multifactor authentication. The results indicate that the proposed generic processes are sufficient to represent these authentication schemes.
Authors and Affiliations
Sabah Al-Fedaghi, MennatAllah Bayoumi
Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications
Accurate and efficient estimators for End to End delay (E2EPD) plays a significant and critical role in Quality of Service (QoS) provisioning in Internet of Things (IoT) wireless communications. The purpose of this paper...
A Novel Position-based Sentiment Classification Algorithm for Facebook Comments
With the popularisation of social networks, people are now more at ease to share their thoughts, ideas, opinions and views about all kinds of topics on public platforms. Millions of users are connected each day on social...
Training Difficulties in Deductive Methods of Verification and Synthesis of Program
The article analyzes the difficulties which Bachelor Degree in Informatics and Computer Sciences students encounter in the process of being trained in applying deductive methods of verification and synthesis of procedura...
Improving Routing Performances to Provide Internet Connectivity in VANETs over IEEE 802.11p
In the intelligent transportation systems, many applications and services could be offered in the road via Internet. Providing these applications over vehicular ad hoc network (VANETs) technology may require good perform...
GDPI: Signature based Deep Packet Inspection using GPUs
Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats. The signature based Network Intrusion and etection System (NIDS) works on packet inspection and...