Applying Context and Role-based Access Control to RFID Security Management
碩士 === 中華大學 === 資訊管理學系(所) === 96 === In recent years, the RFID (Radio Frequency Identification) technology was developed rapidly in many countries due to the convenience and efficiency. When enterprises adopt RFID technology, the security problems follow on RFID cannot be ignored. We should consid...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/65725927619250510794 |
Summary: | 碩士 === 中華大學 === 資訊管理學系(所) === 96 === In recent years, the RFID (Radio Frequency Identification) technology was developed rapidly in many countries due to the convenience and efficiency. When enterprises adopt RFID technology, the security problems follow on RFID cannot be ignored. We should consider the suitable access control mechanisms for RFID. The traditional Role-based Access Control model (RBAC) has not been suitable for the new requirements of access right authorized dynamically according to user’s related context information. In addition, RBAC was unable to satisfy the requirements of using RFID equipments in enterprise.
Therefore, our research combines the contexts according to the characteristics of the RFID technology with Role-based Access Control for RFID security management. The users’ permissions can be authorized dynamically according to current context and access control rules. Finally, our research will enhance the flexibility and efficiency in enterprise security management with RFID technology.
|
---|