LEADER 03236nam 2200577Ia 450 001 9910298530903321 005 20200520144314.0 010 $a3-642-36343-1 024 7 $a10.1007/978-3-642-36343-6 035 $a(CKB)2670000000388972 035 $a(EBL)1317559 035 $a(SSID)ssj0000929949 035 $a(PQKBManifestationID)11932619 035 $a(PQKBTitleCode)TC0000929949 035 $a(PQKBWorkID)10850044 035 $a(PQKB)10706509 035 $a(MiAaPQ)EBC1317559 035 $a(DE-He213)978-3-642-36343-6 035 $a(PPN)187687269 035 $a(EXLCZ)992670000000388972 100 $a20130508d2014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aReal-time security extensions for EPCGlobal networks $ecase study for the pharmaceutical industry /$fMatthieu-P. Schapranow 205 $a1st ed. 2014. 210 $aBerlin ;$aNew York $cSpringer$dc2014 215 $a1 online resource (157 p.) 225 1 $aIn-Memory Data Management Research,$x2196-8055 300 $aDescription based upon print version of record. 311 $a3-642-44722-8 311 $a3-642-36342-3 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices. 330 $aThe transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture. 410 0$aIn-Memory Data Management Research,$x2196-8055 606 $aComputer security 606 $aComputer networks$xSecurity measures 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aSchapranow$b Matthieu-P$01058002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298530903321 996 $aReal-time Security Extensions for EPCglobal Networks$92496440 997 $aUNINA