Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Role-Based Access Control
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Radio-Frequency Identification (RFID) applications: A brief introduction
Advanced Engineering Informatics
Life-cycle data management of engineered-to-order components using radio frequency identification
Advanced Engineering Informatics
Dynamic mobile RFID-based supply chain control and management system in construction
Advanced Engineering Informatics
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Building information modelling - Experts' views on standardisation and industry deployment
Advanced Engineering Informatics
Data Protection on RFID-Based Distributed Storage
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Access control for XML documents and data
Information Security Tech. Report
Advanced Engineering Informatics
A family of dunces: trivial RFID identification and authentication protocols
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Information lifecycle management with RFID for material control on construction sites
Advanced Engineering Informatics
Localization of RFID-equipped assets during the operation phase of facilities
Advanced Engineering Informatics
Hi-index | 0.00 |
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.