Context-aware web services for security control and privacy preservation in an RFID supply chain
نویسندگان
چکیده
Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of security such as product counterfeiting. In this paper, we tackle the security and privacy challenges in RFID by using context-aware web service technology. By employing a seven-layer trust framework, we design the functionalities to comply with web service architecture. In order to address the security and privacy problems, we also use the context parameters such as location and time to model the situations of RFID tags. A complete case of RFID-enabled supply chain in an EPCglobal network using context-aware web services is provided to tackle the RFID security and privacy challenges.
منابع مشابه
A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor
Recently home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. In this paper, we focused on user’s context based intelligent security management for home safety application using RFID and WSN(Wireless Sensor Network). We propose a context aware home safety application model. The proposed context service support security and ...
متن کاملAn Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
People seeking medical attention go in search of medical centers and specialists. For them time is vital as they search for resources, the information should be available with minimum latency. With the advent of wearable computing and ubiquitous computing Context -Aware Web services can be available with much ease, it enables users to retrieve information with relation to their context. While p...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملKEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملKEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJITM
دوره 12 شماره
صفحات -
تاریخ انتشار 2013