TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution

Tutkimustuotosvertaisarvioitu

Standard

Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. / Chaudhary, Sunil; Li, Linfeng; Berki, Eleni; Helenius, Marko; Kela, Juha; Turunen, Markku.

Lecture Notes in Computer Science. Springer Verlag, 2015. s. 128-145 (Lecture Notes in Computer Science; Vuosikerta 9128).

Tutkimustuotosvertaisarvioitu

Harvard

Chaudhary, S, Li, L, Berki, E, Helenius, M, Kela, J & Turunen, M 2015, Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. julkaisussa Lecture Notes in Computer Science. Lecture Notes in Computer Science, Vuosikerta. 9128, Springer Verlag, Sivut 128-145, Iso-Britannia, 1/01/00. https://doi.org/10.1007/978-3-319-19458-5_9

APA

Chaudhary, S., Li, L., Berki, E., Helenius, M., Kela, J., & Turunen, M. (2015). Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. teoksessa Lecture Notes in Computer Science (Sivut 128-145). (Lecture Notes in Computer Science; Vuosikerta 9128). Springer Verlag. https://doi.org/10.1007/978-3-319-19458-5_9

Vancouver

Chaudhary S, Li L, Berki E, Helenius M, Kela J, Turunen M. Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. julkaisussa Lecture Notes in Computer Science. Springer Verlag. 2015. s. 128-145. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-19458-5_9

Author

Chaudhary, Sunil ; Li, Linfeng ; Berki, Eleni ; Helenius, Marko ; Kela, Juha ; Turunen, Markku. / Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution. Lecture Notes in Computer Science. Springer Verlag, 2015. Sivut 128-145 (Lecture Notes in Computer Science).

Bibtex - Lataa

@inproceedings{17dcfa24e3634081bee453f4e2b34e96,
title = "Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution",
abstract = "Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.",
author = "Sunil Chaudhary and Linfeng Li and Eleni Berki and Marko Helenius and Juha Kela and Markku Turunen",
note = "EXT={"}Chaudhary, Sunil{"}",
year = "2015",
doi = "10.1007/978-3-319-19458-5_9",
language = "English",
isbn = "9783319194578",
series = "Lecture Notes in Computer Science",
publisher = "Springer Verlag",
pages = "128--145",
booktitle = "Lecture Notes in Computer Science",
address = "Germany",

}

RIS (suitable for import to EndNote) - Lataa

TY - GEN

T1 - Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution

AU - Chaudhary, Sunil

AU - Li, Linfeng

AU - Berki, Eleni

AU - Helenius, Marko

AU - Kela, Juha

AU - Turunen, Markku

N1 - EXT="Chaudhary, Sunil"

PY - 2015

Y1 - 2015

N2 - Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.

AB - Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.

U2 - 10.1007/978-3-319-19458-5_9

DO - 10.1007/978-3-319-19458-5_9

M3 - Conference contribution

SN - 9783319194578

T3 - Lecture Notes in Computer Science

SP - 128

EP - 145

BT - Lecture Notes in Computer Science

PB - Springer Verlag

ER -