Real-time Security Extensions for EPCglobal Networks Real-time Security Extensions for EPCglobal Networks
In-Memory Data Management Research

Real-time Security Extensions for EPCglobal Networks

Case Study for the Pharmaceutical Industry

    • 39,99 US$
    • 39,99 US$

Lời Giới Thiệu Của Nhà Xuất Bản

The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks.

This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

THỂ LOẠI
Kinh Doanh & Tài Chính Cá Nhân
ĐÃ PHÁT HÀNH
2013
22 tháng 6
NGÔN NGỮ
EN
Tiếng Anh
ĐỘ DÀI
168
Trang
NHÀ XUẤT BẢN
Springer Berlin Heidelberg
NGƯỜI BÁN
Springer Nature B.V.
KÍCH THƯỚC
2,6
Mb
ISSE 2006 Securing Electronic Business Processes ISSE 2006 Securing Electronic Business Processes
2007
Handbook of e-Business Security Handbook of e-Business Security
2018
Technical Building Blocks Technical Building Blocks
2022
Computer and Cyber Security Computer and Cyber Security
2018
Information Technology Auditing Information Technology Auditing
2005
Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
2016
Multi Tenancy for Cloud-Based In-Memory Column Databases Multi Tenancy for Cloud-Based In-Memory Column Databases
2013
Building a Columnar Database on RAMCloud Building a Columnar Database on RAMCloud
2015
Benchmarking Transaction and Analytical Processing Systems Benchmarking Transaction and Analytical Processing Systems
2013
A Real-Time In-Memory Discovery Service A Real-Time In-Memory Discovery Service
2013