DOI QR코드

DOI QR Code

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos

  • Published : 2006.12.31

Abstract

Recently, RFID technology has attracted considerable attention in many industry fields. The RFID environment requires a standard architecture for the smooth exchange of data between heterogeneous networks. The architecture should offer an efficient standard environment, such as a communication environment based on Web Services, PKI or Kerberos-based security, and abstract business processes which could be used in the diverse domains. Therefore, in this paper, we propose an Enterprise Application Framework (EAF) which includes a standard communication protocol, security functions, and abstract level business processes. The suggested architecture is expected to provide a more secure and flexible security management in the dynamic RFID application environments, and is expected to provide an abstract business event for the development of business processes which could apply RFID technology to the existing systems.

Keywords

References

  1. EPCglobal, The Application Level Event (ALE) Specification, Version 1.0, 2005
  2. EPCglobal, EPC Information Services (EPCIS) Version 1.0 Specification, Last Call Working Draft Version, March, 2006
  3. EPCglobal, The EPCglobal Architecture Framework, EPCglobal Final Version, July, 2005
  4. Securing RFID Data for the Supply Chain, http://www.versign.com/epc
  5. Kyuhee An and Mokdong Chung, 'ALE Application Framework for Constructing Effective RFID Application,' EEE'06, USA, 2006, pp. 215-220
  6. M. J. Convington, et al., 'Generalized Role-Based Access Control for Securing Future Applications,' In the Proceedings of the 23rd National Information Systems Security Conference (NISSC), Baltimore, 2000, pp. 115-125
  7. RosettaNet,http://portal.rosettanet.org/cms/sites/RosettaNet
  8. William Stallings, Cryptography and Network Security, Pearson Education, INC. Prentice Hall, 2003

Cited by

  1. A Survey of RFID Deployment and Security Issues vol.7, pp.4, 2011, https://doi.org/10.3745/JIPS.2011.7.4.561