000 | 03709nam a22005895i 4500 | ||
---|---|---|---|
001 | vtls000544451 | ||
003 | RU-ToGU | ||
005 | 20210922083032.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 |
_a9783642363436 _9978-3-642-36343-6 |
||
024 | 7 |
_a10.1007/978-3-642-36343-6 _2doi |
|
035 | _ato000544451 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aHF54.5-54.56 | |
072 | 7 |
_aKJQ _2bicssc |
|
072 | 7 |
_aUF _2bicssc |
|
072 | 7 |
_aBUS083000 _2bisacsh |
|
072 | 7 |
_aCOM039000 _2bisacsh |
|
082 | 0 | 4 |
_a650 _223 |
100 | 1 |
_aSchapranow, Matthieu-P. _eauthor. _9448365 |
|
245 | 1 | 0 |
_aReal-time Security Extensions for EPCglobal Networks _helectronic resource _bCase Study for the Pharmaceutical Industry / _cby Matthieu-P. Schapranow. |
260 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
||
300 |
_aXXII, 146 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aIn-Memory Data Management Research | |
505 | 0 | _aIntroduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices. | |
520 | _aThe transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture. | ||
650 | 0 |
_aEconomics. _9135154 |
|
650 | 0 |
_aComputer network architectures. _9566231 |
|
650 | 0 |
_aSoftware engineering. _9566225 |
|
650 | 0 |
_aData protection. _9303937 |
|
650 | 0 |
_aData structures (Computer science). _9566232 |
|
650 | 0 |
_aInformation systems. _9303226 |
|
650 | 0 |
_aManagement information systems. _9299049 |
|
650 | 1 | 4 |
_aEconomics/Management Science. _9247365 |
650 | 2 | 4 |
_aBusiness Information Systems. _9299050 |
650 | 2 | 4 |
_aComputer Systems Organization and Communication Networks. _9566233 |
650 | 2 | 4 |
_aSystems and Data Security. _9303939 |
650 | 2 | 4 |
_aSoftware Engineering/Programming and Operating Systems. _9303115 |
650 | 2 | 4 |
_aData Structures. _9303104 |
650 | 2 | 4 |
_aInformation Systems and Communication Service. _9304271 |
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 | 0 |
_aIn-Memory Data Management Research _9447663 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-36343-6 |
912 | _aZDB-2-SBE | ||
999 | _c402268 |