Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Enforcing Access Control Using Risk Assessment
ECUMN '07 Proceedings of the Fourth European Conference on Universal Multiservice Networks
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Proceedings of the 15th ACM conference on Computer and communications security
A Practical Experience with RFID Security
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
Graceful privilege reduction in RFID security
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-30. Risk Management Guide for Information Technology Systems
Hi-index | 0.00 |
Radio frequency identification (RFID) technology is used for access control systems, public transit fares, credit and debit cards, and for anti-counterfeiting purposes. In all three cases malicious duplication of RFID tags or their theft can have significant consequences for the owner or product user. This paper presents an implementation of a risk-based access control system, Dynamic Risk Assessment Access Control (DRAAC) for the Microsoft Windows operating system. This implementation of DRAAC can be connected to a wide range of devices including RFID systems, smartphones, and PCs.