{"title":"rfid供应链中外包epc相关数据的实际访问控制管理","authors":"S. Evdokimov, O. Günther","doi":"10.1109/ICEBE.2007.85","DOIUrl":null,"url":null,"abstract":"To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsourced data can be accessed by several parties, the managing of discretionary access control to it becomes a very important issue. In this paper we present an approach that uses selective encryption for managing discretionary read/write access to the data that describe tagged objects and are submitted by a number of parties to a central datastore. Our approach does not reveal relationships between the parties and allows efficient dynamic assignment of read permissions. We proceed with presenting experimental performance results and based on them discuss the applicability of our approach to practical scenarios.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain\",\"authors\":\"S. Evdokimov, O. Günther\",\"doi\":\"10.1109/ICEBE.2007.85\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsourced data can be accessed by several parties, the managing of discretionary access control to it becomes a very important issue. In this paper we present an approach that uses selective encryption for managing discretionary read/write access to the data that describe tagged objects and are submitted by a number of parties to a central datastore. Our approach does not reveal relationships between the parties and allows efficient dynamic assignment of read permissions. We proceed with presenting experimental performance results and based on them discuss the applicability of our approach to practical scenarios.\",\"PeriodicalId\":184487,\"journal\":{\"name\":\"IEEE International Conference on e-Business Engineering (ICEBE'07)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Conference on e-Business Engineering (ICEBE'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEBE.2007.85\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on e-Business Engineering (ICEBE'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEBE.2007.85","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsourced data can be accessed by several parties, the managing of discretionary access control to it becomes a very important issue. In this paper we present an approach that uses selective encryption for managing discretionary read/write access to the data that describe tagged objects and are submitted by a number of parties to a central datastore. Our approach does not reveal relationships between the parties and allows efficient dynamic assignment of read permissions. We proceed with presenting experimental performance results and based on them discuss the applicability of our approach to practical scenarios.