Algorithms for string searching
ACM SIGIR Forum
Role-Based Access Control Models
Computer
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Introduction to Algorithms
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Simple deterministic wildcard matching
Information Processing Letters
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Security challenges of the EPCglobal network
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
From tracking with RFID to intelligent products
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
An Aggregating Discovery Service for the EPCglobal Network
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Space efficient indexes for string matching with don't cares
ISAAC'07 Proceedings of the 18th international conference on Algorithms and computation
Discovery service design in the EPCglobal network: towards full supply chain visibility
IOT'08 Proceedings of the 1st international conference on The internet of things
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Comparison of Discovery Service Architectures for the Internet of Things
SUTC '10 Proceedings of the 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
An efficient distributed discovery service for EPCglobal network in nested package scenarios
Journal of Network and Computer Applications
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Due to the highly sensitive business information communicated within RFID-enabled supply chain networks, there is an urgent need for a secure and effective track & trace system. In this paper, we aim to design and implement a secure track & trace system (SecTTS) based on the EPCglobal network where the EPC Discovery Services (EPCDSs) is the most important component. In SecTTS, the EPCDS is designed as a semi-trusted server, contrasting the assumptions of previous works, which requires a trusted EPCDS. Our EPCDS is implemented based on the relay model where set-based relay policy is proposed to allow each supply chain partner to define different relay policies for information with different sensitivity. We implement a prototype of SecTTS and conduct extensive experiments. The results validate that our design is practical and cost effective.