IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems
نویسنده
چکیده
1536-1268/03/$17.00 © 2003 IEEE ! Published by the IEEE CS and IEEE ComSoc PERVASIVEcomputing 9 W hat if networked computers were as cheap as paper clips and could be attached to things as easily as a yellow sticky? We are about to find out, because such computers are being deployed across the world as you read this. They are, of course, Radio Frequency Identification tags—low-power, short-range communication devices that we can embed into everyday objects to track location, monitor security, and record the status of events or even environmental conditions. Conceptualizing them simply as ID tags greatly underestimates their capabilities, considering some have local computing power, persistent storage, and communication capabilities.
منابع مشابه
Pervasive Computing Goes to Work: Interfacing to the Enterprise
6 PERVASIVEcomputing 1536-1268/02/$17.00 © 2002 IEEE T he paperless office is an idea whose time has come, and come, and come again. To see how pervasive computing applications might bring some substance to this dream, I spoke recently with key managers and technologists at McKesson Corporation (San Francisco), a healthcare supplier, service, and technology company with US$50 billion in sales l...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملrfid in pervasive computing: State-of-the-art and outlook
rfid has already found its way into a variety of large scale applications and arguably it is already one of themost successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobi...
متن کاملSecurity co-existence of wireless sensor networks and RFID for pervasive computing
Recentadvances inwirelessnetworksandembedded systemshavecreatedanewclass ofpervasive systems such as Wireless Sensor Networks (WSNs) and Radio Frequency IDentification (RFID) systems. WSNs and RFID systems provide promising solutions for a wide variety of applications, particularly in pervasive computing.However, security andprivacy concernshave raised serious challenges on these systems. These...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Distributed Systems Online
دوره 4 شماره
صفحات -
تاریخ انتشار 2003