|
|
|
|
LEADER |
03541nam a22006015i 4500 |
001 |
978-3-642-36343-6 |
003 |
DE-He213 |
005 |
20151204182355.0 |
007 |
cr nn 008mamaa |
008 |
130622s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642363436
|9 978-3-642-36343-6
|
024 |
7 |
|
|a 10.1007/978-3-642-36343-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a HF54.5-54.56
|
072 |
|
7 |
|a KJQ
|2 bicssc
|
072 |
|
7 |
|a UF
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a COM039000
|2 bisacsh
|
082 |
0 |
4 |
|a 650
|2 23
|
082 |
0 |
4 |
|a 658.05
|2 23
|
100 |
1 |
|
|a Schapranow, Matthieu-P.
|e author.
|
245 |
1 |
0 |
|a Real-time Security Extensions for EPCglobal Networks
|h [electronic resource] :
|b Case Study for the Pharmaceutical Industry /
|c by Matthieu-P. Schapranow.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XXII, 146 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a In-Memory Data Management Research
|
505 |
0 |
|
|a Introduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices.
|
520 |
|
|
|a The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.
|
650 |
|
0 |
|a Business.
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Business
|x Data processing.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Business and Management.
|
650 |
2 |
4 |
|a IT in Business.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a Data Structures.
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642363429
|
830 |
|
0 |
|a In-Memory Data Management Research
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36343-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SBE
|
950 |
|
|
|a Business and Economics (Springer-11643)
|