Location Privacy in Pervasive Computing
IEEE Pervasive Computing
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Tropos: An Agent-Oriented Software Development Methodology
Autonomous Agents and Multi-Agent Systems
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A threat-based privacy preservation system in untrusted environment
Proceedings of the 2009 International Conference on Hybrid Information Technology
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
An efficient privacy preserving Pub-Sub system for ubiquitous computing
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Radio Frequency Identification (RFID) is used in an increasing number of commercial and scientific applications. The lack of a unified RFID standard and the diversity of available technologies make it difficult to safeguard privacy without being to identify potential threats in advance. To address this problem, we present a threat evaluation system intended to enhance privacy in RFID. Our proposed model allows users to customise services based on their evaluations of potential threats. Furthermore, prospective users may refer to previous user feedback to evaluate the reliability of different service providers and to aid in the selection of suitable commercially-available services.