Inproceedings3013: Unterschied zwischen den Versionen
Mde (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Decker |ErsterAutorVorname=Michael }} {{Publikation Author |Rank=2 |Author=Roman Povalej }} {{Inproceedings |Refer…“) |
Mde (Diskussion | Beiträge) |
||
Zeile 13: | Zeile 13: | ||
|Month=Oktober | |Month=Oktober | ||
|Booktitle=Proceedings of eChallenges 2009 | |Booktitle=Proceedings of eChallenges 2009 | ||
− | |Publisher= | + | |Publisher=IIMC |
|Address=Istanbul, Turkey | |Address=Istanbul, Turkey | ||
+ | |Editor=Paul Cunningham and Miriam Cunningham | ||
}} | }} | ||
{{Publikation Details | {{Publikation Details |
Aktuelle Version vom 1. April 2010, 02:58 Uhr
Proximity-Based Access Control with RFID for Mobile Computing
Proximity-Based Access Control with RFID for Mobile Computing
Published: 2009
Oktober
Herausgeber: Paul Cunningham and Miriam Cunningham
Buchtitel: Proceedings of eChallenges 2009
Verlag: IIMC
Erscheinungsort: Istanbul, Turkey
Nicht-referierte Veröffentlichung
BibTeX
Kurzfassung
The main contribution of this article is the presentation of a special data model to describe access control rules for mobile computing scenarios based on the detection of proximity-relations with Radio Frequency Identity (RFID) technology. Such a model is called Access Control Model. Using this model it is possible to formulate that a mobile computer (e.g. PDA, cellular phone) can be used as remote control for one machine or a class of machines (e.g. air conditioner in one room or all rooms of a building) only when the RFID tag integrated in the mobile computer is within the radio-reach of the RFID reader built-into that machine. Further, the model also supports controlling the access to virtual objects like electronic documents. The proposed model is versatile and thus can help to tackle special security issues in many different application scenarios that involve mobile computing technologies.
Betriebliche Informationssysteme