Access control in federated systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Queue - RFID
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Architecture Evaluation for Distributed Auto-ID Systems
DEXA '06 Proceedings of the 17th International Conference on Database and Expert Systems Applications
Towards Traceability across Sovereign, Distributed RFID Databases
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Context-Dependent Access Control for Contextual Information
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Facilitating RFID Development with the Accada Prototyping Platform
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Hi-index | 0.01 |
Inter-organizational exchange of information about physical objects that is automatically gathered using RFID can increase the traceability of goods in complex supply chains. With the EPCIS specification, a standard for RFID-based events and respective information system interfaces is available. However, it does not address access control in detail, which is a prerequisite for secure information exchange. We propose a novel rule-based, context-aware policy language for describing access rights on large sets of EPCIS Events. Furthermore, we discuss approaches to enforce these policies and introduce an efficient enforcement mechanism based on query recomposition and its prototypical implementation.