“…Outcomes from different readers can be stored to provide a historical record to infer the real trajectory of the tag and thus eliminate both false negative and false positive readings. For example, a middleware approach to security is given by the authors in (Du et al (2009)) where they use an access control scheme as a security layer of a reconfigurable middleware platform. The middleware platform is especially designed to provide security in ubiquitous environments.…”