Skip to main content

Enterprise Application Framework for Constructing Secure RFID Application

  • Conference paper
Advances in Hybrid Information Technology (ICHIT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4413))

Included in the following conference series:

Abstract

In the ubiquitous environment, anyone could easilyaccess all shared informations which means it also has many serious drawbacks, such as security problems. Therefore the ubiquitous environment should provide a security service. This paper suggests an Enterprise Application Framework(EAF) which includes a security module as well as a business process module for constructing secure RFID application. The security module includes user authentication mechanism, key sharing mechanism, and authorization mechanism. Thus, this framework is expected to provide more secure management in the ubiquitous environments such as RFID applications.

This work was supported by the Regional Research Centers Program (Research Center for Logistics Information Technology), granted by the Korean Ministry of Education & Human Resources Development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. EPCglobal, The Application Level Events (ALE) Specification, Version 1.0 (2005)

    Google Scholar 

  2. NIST, http://csrc.nist.gov/rbac/NIST

  3. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

  4. Securing RFID Data for the Supply Chain, http://www.verisign.com/epc

  5. Stallings, W.: Cryptography and Network Security, Pearson Education, Inc. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  6. Szyperski, C.: Component Software. Addison-Wesley, Reading (1998)

    Google Scholar 

  7. Verisign, http://www.verisign.com

  8. Yoon, J., Chol, J.: Ubiquitous, 21th Books (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Marcin S. Szczuka Daniel Howard Dominik Ślȩzak Haeng-kon Kim Tai-hoon Kim Il-seok Ko Geuk Lee Peter M. A. Sloot

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H., Lee, K., Chung, M. (2007). Enterprise Application Framework for Constructing Secure RFID Application. In: Szczuka, M.S., et al. Advances in Hybrid Information Technology. ICHIT 2006. Lecture Notes in Computer Science(), vol 4413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77368-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77368-9_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77367-2

  • Online ISBN: 978-3-540-77368-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics