This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication prools for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.
This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication prools for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

Real-time Security Extensions for EPCglobal Networks: Case Study for the Pharmaceutical Industry
146
Real-time Security Extensions for EPCglobal Networks: Case Study for the Pharmaceutical Industry
146Paperback(Softcover reprint of the original 1st ed. 2014)
Product Details
ISBN-13: | 9783642447228 |
---|---|
Publisher: | Springer Berlin Heidelberg |
Publication date: | 08/14/2013 |
Series: | In-Memory Data Management Research |
Edition description: | Softcover reprint of the original 1st ed. 2014 |
Pages: | 146 |
Product dimensions: | 6.10(w) x 9.25(h) x 0.01(d) |