2012 IEEE International Conference on RFID (RFID) 2012
DOI: 10.1109/rfid.2012.6193045
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of visibility restriction mechanisms for RFID data Discovery Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The information stored in DS is commercially sensitive, which can reveal flow patterns, trading relationships or inventory levels, etc. [2][3]. Therefore DS must authenticate the user's identity first before this user is allowed to access DS.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The information stored in DS is commercially sensitive, which can reveal flow patterns, trading relationships or inventory levels, etc. [2][3]. Therefore DS must authenticate the user's identity first before this user is allowed to access DS.…”
Section: Related Workmentioning
confidence: 99%
“…[2][3]. Therefore DS must authenticate the user's identity first before this user is allowed to access DS [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In subsequent work, Pardal, Harrison and Alves Marques [11] studied visibility restriction mechanisms for MDI and presented effort estimates. This compared the performance of two approaches with a limited semantic expressivity, Enumerated Access Control (EAC) and Chain-of-Communication Tokens (CCT), as well as a third option with extensible semantics, named Chain-of-Trust Assertions (CTA).…”
Section: B Visibility Restriction Approachesmentioning
confidence: 99%
“…SUPPLY CHAIN AUTHORIZATIONS Access control for supply chains is different from traditional authorization because there is a lack of prior knowledge about who should be authorized due to the way that each physical object path emerges [26].…”
Section: A Extensible Access Control Markup Languagementioning
confidence: 99%