Development of the Domain Name System
ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue. Highlights from 25 years of the Computer Communication Review
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Warehousing and Analyzing Massive RFID Data Sets
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Fundamental Modeling Concepts: Effective Communication of IT Systems
Fundamental Modeling Concepts: Effective Communication of IT Systems
Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Efficient storage scheme and query processing for supply chain management using RFID
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
Efficient and effective RFID data warehousing
IDEAS '09 Proceedings of the 2009 International Database Engineering & Applications Symposium
A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data
SIMUL '09 Proceedings of the 2009 First International Conference on Advances in System Simulation
An Aggregating Discovery Service for the EPCglobal Network
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
The effects of virtualization on main memory systems
Proceedings of the Sixth International Workshop on Data Management on New Hardware
A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Bridging physical and virtual worlds: complex event processing for RFID data streams
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Hi-index | 0.00 |
The pharmaceutical industry suffers from steadily increasing counterfeit rates. RFID technology is named as a foundation for an integer and counterfeit-resistant pharmaceutical supply chain. A transformation toward an RFID-aided supply chain involves both technical and business adaptions. We share technical insights of our proposed architecture for storing and searching pharmaceutical RFID event data. From the business perspective, we discuss the viability of RFID-based anti-counterfeiting with respect to its monetary impacts. We define qualitative requirements for software components developed for RFID and provide a quantitative analysis of operational costs for a dedicated service provider for anti-counterfeiting. Its implementation and amortization is discussed for different operating setups to enable access to RFID technology for all participants of pharmaceutical the supply chain