Enforcing RFID data visibility restrictions using XACML security policies
Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. Discover...
Main Authors: | Pardal, Miguel L., Harrison, Mark, Marques, Jose Alves, Sarma, Sanjay Emani |
---|---|
Other Authors: | delete |
Format: | Article |
Language: | en_US |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2013
|
Online Access: | http://hdl.handle.net/1721.1/79678 https://orcid.org/0000-0003-2812-039X |
Similar Items
-
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services
by: Pardal, Miguel L., et al.
Published: (2014) -
Heterogeneity XACML policy evaluation engine
by: Teo, Poh Kuang, et al.
Published: (2014) -
Session-based security enhancement of RFID systems for emerging open-loop applications
by: Wang, Junyu, et al.
Published: (2016) -
Modality conflict analysis in XACML policy evaluation
by: Teo, Poh Kuang, et al.
Published: (2017) -
RFIDSim - A physical and logical layer simulation engine for passive RFID
by: Floerkemeier, Christian, et al.
Published: (2010)