Exploiting virtual synchrony in distributed systems
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Continuous queries over append-only databases
SIGMOD '92 Proceedings of the 1992 ACM SIGMOD international conference on Management of data
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Role-Based Access Control Models
Computer
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Managing access control policies using access control spaces
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
Short Signatures from the Weil Pairing
Journal of Cryptology
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Fourth-factor authentication: somebody you know
Proceedings of the 13th ACM conference on Computer and communications security
Towards Traceability across Sovereign, Distributed RFID Databases
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
A Survey of RFID Authentication Protocols
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
RFID in the supply chain: panacea or Pandora's box?
Communications of the ACM
Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
On the practical importance of communication complexity for secure multi-party computation protocols
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy-preserving computation of benchmarks on item-level data using RFID
Proceedings of the third ACM conference on Wireless network security
Enterprise application framework for constructing secure RFID application
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Securely disseminating RFID events
Proceedings of the 5th ACM international conference on Distributed event-based system
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
Encryption-enforced access control for an RFID discovery service
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Hi-index | 0.00 |
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects' trajectories. Existing access control models cannot encode this information efficiently. This poses a policy management problem to administrators in real-world supply chains where companies want to protect their goods tracking data. In this paper we propose a new access control model as an extension to attribute-based access control that allows trajectory-based visibility policies. We prove the security properties of our novel authentication protocol for distributed systems that can supply the decision algorithm with the necessary reliable information using only standard passive RFID tags. As a result companies will be able to improve confidentiality protection and governance of their object tracking data and more trustingly engage in data sharing agreements.