Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management
碩士 === 華梵大學 === 資訊管理學系碩士班 === 94 === The RFID technique is extensively applied in e-Business scope. It mainly supports the quickly and accurately work on novel assets management. But it is still lack of privacy protection on the EPC code. For the worse case, some hackers may steal the code content e...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/46070362565630124207 |
id |
ndltd-TW-094HCHT0396036 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094HCHT03960362016-06-01T04:14:19Z http://ndltd.ncl.edu.tw/handle/46070362565630124207 Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management 架構一個以角色為金鑰管理基礎的企業RFID標籤加密與隱私管理 Kun-Lin Lee 李昆霖 碩士 華梵大學 資訊管理學系碩士班 94 The RFID technique is extensively applied in e-Business scope. It mainly supports the quickly and accurately work on novel assets management. But it is still lack of privacy protection on the EPC code. For the worse case, some hackers may steal the code content easily during the transaction transmission between cooperative businesses. This case will cause some dangerous situation such as the business secret leaking or even the consumer privacy damage. For above, we propose a management framework, which use the role-based key management to fully patch the information leaking shortcoming of RFID tag. First of all, it classifies the security rank of the RFID-base information and supports the appropriate encryption to the corresponding rank. Afterwards, to handle the encryption/decryption key management, we also present a role-based key management solution. With our proposed management framework, the RFID-based business information is fully protected form the leaking problem and is properly managed by the role-based key method. Chun-Te Chen 陳俊德 2006 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 94 === The RFID technique is extensively applied in e-Business scope. It mainly supports the quickly and accurately work on novel assets management. But it is still lack of privacy protection on the EPC code. For the worse case, some hackers may steal the code content easily during the transaction transmission between cooperative businesses. This case will cause some dangerous situation such as the business secret leaking or even the consumer privacy damage. For above, we propose a management framework, which use the role-based key management to fully patch the information leaking shortcoming of RFID tag. First of all, it classifies the security rank of the RFID-base information and supports the appropriate encryption to the corresponding rank. Afterwards, to handle the encryption/decryption key management, we also present a role-based key management solution. With our proposed management framework, the RFID-based business information is fully protected form the leaking problem and is properly managed by the role-based key method.
|
author2 |
Chun-Te Chen |
author_facet |
Chun-Te Chen Kun-Lin Lee 李昆霖 |
author |
Kun-Lin Lee 李昆霖 |
spellingShingle |
Kun-Lin Lee 李昆霖 Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
author_sort |
Kun-Lin Lee |
title |
Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
title_short |
Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
title_full |
Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
title_fullStr |
Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
title_full_unstemmed |
Construction of the Enterprise-level RFID Security and Privacy Using Role-Based Key Management |
title_sort |
construction of the enterprise-level rfid security and privacy using role-based key management |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/46070362565630124207 |
work_keys_str_mv |
AT kunlinlee constructionoftheenterpriselevelrfidsecurityandprivacyusingrolebasedkeymanagement AT lǐkūnlín constructionoftheenterpriselevelrfidsecurityandprivacyusingrolebasedkeymanagement AT kunlinlee jiàgòuyīgèyǐjiǎosèwèijīnyàoguǎnlǐjīchǔdeqǐyèrfidbiāoqiānjiāmìyǔyǐnsīguǎnlǐ AT lǐkūnlín jiàgòuyīgèyǐjiǎosèwèijīnyàoguǎnlǐjīchǔdeqǐyèrfidbiāoqiānjiāmìyǔyǐnsīguǎnlǐ |
_version_ |
1718286263882088448 |