000 03507nam a22005775i 4500
001 978-3-642-36343-6
003 DE-He213
005 20140220082516.0
007 cr nn 008mamaa
008 130622s2014 gw | s |||| 0|eng d
020 _a9783642363436
_9978-3-642-36343-6
024 7 _a10.1007/978-3-642-36343-6
_2doi
050 4 _aHF54.5-54.56
072 7 _aKJQ
_2bicssc
072 7 _aUF
_2bicssc
072 7 _aBUS083000
_2bisacsh
072 7 _aCOM039000
_2bisacsh
082 0 4 _a650
_223
100 1 _aSchapranow, Matthieu-P.
_eauthor.
245 1 0 _aReal-time Security Extensions for EPCglobal Networks
_h[electronic resource] :
_bCase Study for the Pharmaceutical Industry /
_cby Matthieu-P. Schapranow.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXXII, 146 p. 36 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIn-Memory Data Management Research
505 0 _aIntroduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices.
520 _aThe transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.
650 0 _aEconomics.
650 0 _aComputer network architectures.
650 0 _aSoftware engineering.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aInformation systems.
650 0 _aManagement information systems.
650 1 4 _aEconomics/Management Science.
650 2 4 _aBusiness Information Systems.
650 2 4 _aComputer Systems Organization and Communication Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
650 2 4 _aData Structures.
650 2 4 _aInformation Systems and Communication Service.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642363429
830 0 _aIn-Memory Data Management Research
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-36343-6
912 _aZDB-2-SBE
999 _c93171
_d93171