Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model

View through CrossRef
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering. Hence, there is a need to mitigate these threats at the design stage. Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm. This not only makes the design complex but also results in tangling and scattering problems. We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects. Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique. In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram. Using this approach, our contribution makes a clear difference from previous work. Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile. Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness. Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage. Thus, the complexity of models and the time and effort required for future modifications of design models are reduced.
Title: Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
Description:
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering.
However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering.
Hence, there is a need to mitigate these threats at the design stage.
Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm.
This not only makes the design complex but also results in tangling and scattering problems.
We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects.
Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique.
In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram.
Using this approach, our contribution makes a clear difference from previous work.
Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile.
Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness.
Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage.
Thus, the complexity of models and the time and effort required for future modifications of design models are reduced.

Related Results

An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Mitigation translocation for conservation of New Zealand skinks
Mitigation translocation for conservation of New Zealand skinks
<p>Worldwide, human development is leading to the expansion and intensification of land use, with increasing encroachment on natural habitats. A rising awareness of the delet...
Shenzi 16-Inch Oil Export SCR CVA Verification
Shenzi 16-Inch Oil Export SCR CVA Verification
Abstract In 2006 Enterprise developed a 16-inch oil export system from Shenzi field located in Green Canyon Block 653 in the Gulf of Mexico, approximately 120 nau...
Platform Verification - Aview From Amember Of Industry
Platform Verification - Aview From Amember Of Industry
ABSTRACT Concerns have been raised in many sectors regarding the safety and reliability of offshore platforms. In this paper, the history of offshore operations a...
Smart Chatbot for User Authentication
Smart Chatbot for User Authentication
Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems w...

Back to Top