Results 1 -
8 of
8
Abstract A Platform for RFID Security and Privacy Administration
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract
- Add to MetaCart
standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID
A platform for RFID security and privacy administration
- In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association
, 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract
-
Cited by 20 (0 self)
- Add to MetaCart
reader with unique RFID tag emulation capabilities. Our system provides a platform for both automated and coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID
Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology
"... This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a pa-tient’s database, in order to reduce errors in patient care. It has been developed with a collaboration between the Univ ..."
Abstract
- Add to MetaCart
This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a pa-tient’s database, in order to reduce errors in patient care. It has been developed with a collaboration between
Effective Collision Avoidance Mechanism for RFID Tags
"... Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol sear ..."
Abstract
- Add to MetaCart
Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol
An Radio Frequency Identification and Enterprise Resource Planning-Enabled Mobile Asset Management Information System
"... Abstract—While more and more companies plan to implement asset management solutions to control supply chain costs and public sectors strive for effective and timely management of public facilities, there are significant moves coming to improve both asset management processes and the information tech ..."
Abstract
- Add to MetaCart
real value in the form of reduced costs, staff productivity, and effective management today. The proposed system was designed for tagging valuable assets or equipment, providing asset location information, auditing and triggering for service, and retrieving maintenance requirements and procedure based
Ubiquitous Privacy Protection
"... Abstract The main message of this position paper is that technology need not necessarily be an obstacle to privacy protection: if legal and social issues are considered from the outset, then technology can also be used to allow individuals to exercise their rights. We believe that the key issue is t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
management · audit · a posteriori verification · privacy policy model · formal specification · user consent This research has been supported by the projects PRIAM- Privacy issues in ambient intelligence- funded by INRIA, PEARL- Privacy enhanced security architecture for RFID labels- funded by NL
Position Paper
, 2009
"... Abstract The main message of this position paper is that ubiquitous computing technology need not necessarily be an obstacle to privacy protection: if legal and social issues are given proper consideration, technology can also be used to allow individuals to exercise their rights.Webelievethatthekey ..."
Abstract
- Add to MetaCart
the challenges posed by ubiquitous computing and the opportunities to strengthen privacy. For each of these requirements, we present the legal and social motivations, suggest technical challenges and provide hints on possible solutions based on our on-going work. Keywords trust management · audit · a posteriori
Evaluation of Cycle-Count Policies for Supply Chains with Inventory Inaccuracy and Implications on RFID Investments
, 2009
"... Inventory record inaccuracy deteriorates supply chain performance because it leads to ineffective replenishment decisions. Conducting cycle counts (i.e., periodic inventory auditing) is a common approach to correcting inventory records. It is not clear, however, how inaccuracy at different locations ..."
Abstract
- Add to MetaCart
Inventory record inaccuracy deteriorates supply chain performance because it leads to ineffective replenishment decisions. Conducting cycle counts (i.e., periodic inventory auditing) is a common approach to correcting inventory records. It is not clear, however, how inaccuracy at different