Real-time Security Extensions for EPCglobal Networks at Meripustak

Real-time Security Extensions for EPCglobal Networks

Books from same Author: Matthieu-P Schapranow

Books from same Publisher: Springer Velage

Related Category: Author List / Publisher List


  • Retail Price: ₹ 10029/- [ 5.00% off ]

    Seller Price: ₹ 9528

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 5.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 5.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Matthieu-P Schapranow
    PublisherSpringer Velage
    ISBN9783642363429
    Pages168
    BindingHardcover
    LanguageEnglish
    Publish YearJuly 2013

    Description

    Springer Velage Real-time Security Extensions for EPCglobal Networks by Matthieu-P Schapranow

    The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks.This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.