000 03709nam a22005895i 4500
001 vtls000544451
003 RU-ToGU
005 20210922083032.0
007 cr nn 008mamaa
008 160915s2014 gw | s |||| 0|eng d
020 _a9783642363436
_9978-3-642-36343-6
024 7 _a10.1007/978-3-642-36343-6
_2doi
035 _ato000544451
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aHF54.5-54.56
072 7 _aKJQ
_2bicssc
072 7 _aUF
_2bicssc
072 7 _aBUS083000
_2bisacsh
072 7 _aCOM039000
_2bisacsh
082 0 4 _a650
_223
100 1 _aSchapranow, Matthieu-P.
_eauthor.
_9448365
245 1 0 _aReal-time Security Extensions for EPCglobal Networks
_helectronic resource
_bCase Study for the Pharmaceutical Industry /
_cby Matthieu-P. Schapranow.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXXII, 146 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aIn-Memory Data Management Research
505 0 _aIntroduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices.
520 _aThe transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.
650 0 _aEconomics.
_9135154
650 0 _aComputer network architectures.
_9566231
650 0 _aSoftware engineering.
_9566225
650 0 _aData protection.
_9303937
650 0 _aData structures (Computer science).
_9566232
650 0 _aInformation systems.
_9303226
650 0 _aManagement information systems.
_9299049
650 1 4 _aEconomics/Management Science.
_9247365
650 2 4 _aBusiness Information Systems.
_9299050
650 2 4 _aComputer Systems Organization and Communication Networks.
_9566233
650 2 4 _aSystems and Data Security.
_9303939
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
_9303115
650 2 4 _aData Structures.
_9303104
650 2 4 _aInformation Systems and Communication Service.
_9304271
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aIn-Memory Data Management Research
_9447663
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-36343-6
912 _aZDB-2-SBE
999 _c402268