Skip to main content

RFID-Based ALE Application Framework Using Context-Based Security Service

  • Conference paper
  • 786 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Abstract

We propose an RFID-based ALE Application Framework (AAF) providing context-aware security services, which could dynamically adapt security policies. From the proposed framework, we can construct RFID application fast and efficiently through general, reusable, and extensible API due to the software reusability. The proposed model consists of an adaptive security level algorithm based on MAUT and Simple Heuristics. The security level algorithm could adopt diverse security services according to the contextual information in the network environment. Therefore, the proposed model is expected to provide more flexible security management in the heterogeneous network environments.

This work was supported by the Regional Research Centers Program(Research Center for Logistics Information Technology), granted by the Korean Ministry of Education & Human Resources Development.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Auto-ID Center, EPC Information Service, White Paper (2004)

    Google Scholar 

  2. Dey, A.K.: Providing Architectural Support for Building Context-Aware Applications, Ph. D. Dissertation, Georgia Institute of Technology (2000)

    Google Scholar 

  3. e-Biz Standardization White Paper, Ministry of Commerce, Industry and Energy, Korea Institute for Electronic Commerce (2004)

    Google Scholar 

  4. EPCglobal, Object Name Service(ONS) 1.0, Working Draft Version (2004)

    Google Scholar 

  5. EPCglobal, The Application Level Events (ALE) Specification, Version 1.0, Specification (2005)

    Google Scholar 

  6. Chen, G.: A survey of context-aware mobile computing research, Dartmouth Univ. TR2000-38

    Google Scholar 

  7. Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)

    Google Scholar 

  8. Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, pp. 119–140. Oxford University Press, New York (1999)

    Google Scholar 

  9. The SSL Protocol Version 3.0, http://wp.netscape.com/eng/ssl3/draft302.txt

  10. Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, NJ (2003)

    Google Scholar 

  11. The TLS Protocol Version 1.0, http://www.ietf.org/rfc/rfc2246.txt

  12. von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)

    Google Scholar 

  13. The Workflow Management Coalition, http://www.wfmc.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwon, J., Chung, M. (2006). RFID-Based ALE Application Framework Using Context-Based Security Service. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_112

Download citation

  • DOI: https://doi.org/10.1007/11751632_112

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics