• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 8 of 8

Abstract A Platform for RFID Security and Privacy Administration

by Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract - Add to MetaCart
standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID

A platform for RFID security and privacy administration

by Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman - In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association , 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
reader with unique RFID tag emulation capabilities. Our system provides a platform for both automated and coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID

Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology

by Dr Thuemmler C, Prof Buchanan W, Kumar V
"... This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a pa-tient’s database, in order to reduce errors in patient care. It has been developed with a collaboration between the Univ ..."
Abstract - Add to MetaCart
This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a pa-tient’s database, in order to reduce errors in patient care. It has been developed with a collaboration between

Effective Collision Avoidance Mechanism for RFID Tags

by Garima Saraf, Md. Zahid Alam
"... Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol sear ..."
Abstract - Add to MetaCart
Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol

An Radio Frequency Identification and Enterprise Resource Planning-Enabled Mobile Asset Management Information System

by Chuan-jun Su, Tsung-ching Chou
"... Abstract—While more and more companies plan to implement asset management solutions to control supply chain costs and public sectors strive for effective and timely management of public facilities, there are significant moves coming to improve both asset management processes and the information tech ..."
Abstract - Add to MetaCart
real value in the form of reduced costs, staff productivity, and effective management today. The proposed system was designed for tagging valuable assets or equipment, providing asset location information, auditing and triggering for service, and retrieving maintenance requirements and procedure based

Ubiquitous Privacy Protection

by C. Bryce, M. A. C. Dekker, S. Etalle, D. Le Métayer, M. Minier, S. Ubéda, C. Bryce, M. Minier, S. Ubéda Insa-lyon (france
"... Abstract The main message of this position paper is that technology need not necessarily be an obstacle to privacy protection: if legal and social issues are considered from the outset, then technology can also be used to allow individuals to exercise their rights. We believe that the key issue is t ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
management · audit · a posteriori verification · privacy policy model · formal specification · user consent This research has been supported by the projects PRIAM- Privacy issues in ambient intelligence- funded by INRIA, PEARL- Privacy enhanced security architecture for RFID labels- funded by NL

Position Paper

by C. Bryce, M. A. C. Dekker, S. Etalle, D. Le Métayer, F. Le, Mouël M. Minier, J. Moret-bailly, S. Ubéda, C. Bryce, F. Le Mouël, M. Minier, S. Ubéda Insa-lyon (france, J. Moret-bailly, Jean Monnet , 2009
"... Abstract The main message of this position paper is that ubiquitous computing technology need not necessarily be an obstacle to privacy protection: if legal and social issues are given proper consideration, technology can also be used to allow individuals to exercise their rights.Webelievethatthekey ..."
Abstract - Add to MetaCart
the challenges posed by ubiquitous computing and the opportunities to strengthen privacy. For each of these requirements, we present the legal and social motivations, suggest technical challenges and provide hints on possible solutions based on our on-going work. Keywords trust management · audit · a posteriori

Evaluation of Cycle-Count Policies for Supply Chains with Inventory Inaccuracy and Implications on RFID Investments

by A. Gürhan, Kök Kevin, H. Shang , 2009
"... Inventory record inaccuracy deteriorates supply chain performance because it leads to ineffective replenishment decisions. Conducting cycle counts (i.e., periodic inventory auditing) is a common approach to correcting inventory records. It is not clear, however, how inaccuracy at different locations ..."
Abstract - Add to MetaCart
Inventory record inaccuracy deteriorates supply chain performance because it leads to ineffective replenishment decisions. Conducting cycle counts (i.e., periodic inventory auditing) is a common approach to correcting inventory records. It is not clear, however, how inaccuracy at different
Results 1 - 8 of 8
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University