2009 First Asian Himalayas International Conference on Internet 2009
DOI: 10.1109/ahici.2009.5340262
|View full text |Cite
|
Sign up to set email alerts
|

Access control for OSGi-based reconfigurable RFID middleware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Outcomes from different readers can be stored to provide a historical record to infer the real trajectory of the tag and thus eliminate both false negative and false positive readings. For example, a middleware approach to security is given by the authors in (Du et al (2009)) where they use an access control scheme as a security layer of a reconfigurable middleware platform. The middleware platform is especially designed to provide security in ubiquitous environments.…”
Section: Context-aware Solutionsmentioning
confidence: 99%
“…Outcomes from different readers can be stored to provide a historical record to infer the real trajectory of the tag and thus eliminate both false negative and false positive readings. For example, a middleware approach to security is given by the authors in (Du et al (2009)) where they use an access control scheme as a security layer of a reconfigurable middleware platform. The middleware platform is especially designed to provide security in ubiquitous environments.…”
Section: Context-aware Solutionsmentioning
confidence: 99%