A system architecture for context-aware mobile computing
A system architecture for context-aware mobile computing
Towards a Better Understanding of Context and Context-Awareness
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
Intrusion Detection System: Technology and Development
AINA '03 Proceedings of the 17th International Conference on Advanced Information Networking and Applications
Selection Criteria for Intrusion Detection Systems
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Providing architectural support for building context-aware applications
Providing architectural support for building context-aware applications
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
An Approach to Security and Privacy of RFID System for Supply Chain
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
Trust and Radio Frequency Identification (RFID) Adoption within an Alliance
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Product Specific Security Features Based on RFID Technology
SAINT-W '06 Proceedings of the International Symposium on Applications on Internet Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
RFID Security Protocol by Lightweight ECC Algorithm
ALPIT '07 Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Context-Aware Environment-Role-Based Access Control Model for Web Services
MUE '08 Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering
Technology, Standards, and Real-World Deployments of the EPC Network
IEEE Internet Computing
A Multi Agent-Based System for Securing University Campus: Design and Architecture
ISMS '10 Proceedings of the 2010 International Conference on Intelligent Systems, Modelling and Simulation
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
TMS-RFID: Temporal management of large-scale RFID applications
Information Systems Frontiers
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
Automation and optimisation of supply-chain activities are made possible by radio frequency identification RFID technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of security such as product counterfeiting. In this paper, we tackle the security and privacy challenges in RFID by using context-aware web service technology. By employing a seven-layer trust framework, we design the functionalities to comply with web service architecture. In order to address the security and privacy problems, we also use the context parameters such as location and time to model the situations of RFID tags. A complete case of RFID-enabled supply chain in an EPCglobal network using context-aware web services is provided to tackle the RFID security and privacy challenges.