Enforcing RFID data visibility restrictions using XACML security policies
Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. Discover...
Main Authors: | Pardal, Miguel L. (Author), Harrison, Mark (Author), Marques, Jose Alves (Author), Sarma, Sanjay Emani (Contributor) |
---|---|
Other Authors: | delete (Contributor), Massachusetts Institute of Technology. Auto-ID Laboratory (Contributor) |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE),
2013-07-23T14:57:56Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services
by: Pardal, Miguel L., et al.
Published: (2014) -
Using XACML for Home Network Security Policy
by: Shih-Chieh Liang, et al.
Published: (2006) -
Session-based security enhancement of RFID systems for emerging open-loop applications
by: Wang, Junyu, et al.
Published: (2016) -
Use XACML for Web Services Delegation
by: Kuo-Hsiang Hung, et al.
Published: (2008) -
EXACML: An Extended XACML Model to Ensure Secure Information Access in Web Services
by: Chun-Hao Huang, et al.
Published: (2008)