Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution
Tutkimustuotos › › vertaisarvioitu
Standard
Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. / Chaudhary, Sunil; Li, Linfeng; Berki, Eleni; Helenius, Marko; Kela, Juha; Turunen, Markku.
Lecture Notes in Computer Science. Springer Verlag, 2015. s. 128-145 (Lecture Notes in Computer Science; Vuosikerta 9128).Tutkimustuotos › › vertaisarvioitu
Harvard
APA
Vancouver
Author
Bibtex - Lataa
}
RIS (suitable for import to EndNote) - Lataa
TY - GEN
T1 - Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution
AU - Chaudhary, Sunil
AU - Li, Linfeng
AU - Berki, Eleni
AU - Helenius, Marko
AU - Kela, Juha
AU - Turunen, Markku
N1 - EXT="Chaudhary, Sunil"
PY - 2015
Y1 - 2015
N2 - Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.
AB - Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.
U2 - 10.1007/978-3-319-19458-5_9
DO - 10.1007/978-3-319-19458-5_9
M3 - Conference contribution
SN - 9783319194578
T3 - Lecture Notes in Computer Science
SP - 128
EP - 145
BT - Lecture Notes in Computer Science
PB - Springer Verlag
ER -