...
首页> 外文期刊>Journal of Engineering & Applied Sciences >Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM)
【24h】

Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM)

机译:背景感知安全策略:启用RFID供应链管理中的防伪模型(SCM)

获取原文
获取原文并翻译 | 示例
           

摘要

Radio Frequency Identification (RFID) applications bring a lot of benefits in Supply Chain Management (SCM). However, RFID still faces several challenges and issues while implementing and evaluating in Supply Chain Management technologies. Due to security concerns, the SCM data are exposed to active and passive attacks that lead to counterfeiting attacks: fraud and cloned attacks. For an organization data most treasured assets, information sharing between different companies become an issue. This is because different organizations have different role and responsibilities in data management and security policies in their environment. We propose testing and evaluating techniques for access control model policies. Based on findings, we have chosen Role Base Access Control (RBAC) most suitable candidate for an access control model. Furthermore, we have implemented RBAC and Event Condition Action (ECA) to context-aware security policy based RFID SCM in order to tackle counterfeiting attacks. The findings suggest the generation of five main security policies model in thwarting counterfeiting for any RFID-enabled supply chain.
机译:射频识别(RFID)应用在供应链管理(SCM)中带来了大量的好处。然而,在供应链管理技术实施和评估时,RFID仍然面临着多种挑战和问题。由于安全问题,SCM数据暴露于有效和被动攻击,导致违反攻击:欺诈和克隆攻击。对于组织数据最珍贵的资产,不同公司之间的信息共享成为一个问题。这是因为不同的组织对其环境中的数据管理和安全策略具有不同的作用和责任。我们提出测试和评估访问控制模型策略的技术。根据调查结果,我们选择了用于访问控制模型的角色基础访问控制(RBAC)最合适的候选者。此外,我们已经实现了基于上下文的安全策略的RFID SCM的RBAC和事件条件操作(ECA),以便解决伪造攻击。调查结果表明,在阻碍所有支持RFID的供应链的违反伪造中产生五个主要安全政策模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号