Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3
Page No. 722 - 733

Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM)

Authors : Irene Anastasia Patric and Manmeet Mahinderjit Singh

References

Ausanka-Crues, R., 2001. Methods for access control: Advances and limitations. Harvey Mudd College, Claremont, California. https://www.cs.hmc.edu/~mike/public_html/courses/security/s06/projects/ryan.pdf.

Belokosztolszki, A., 2004. Role-based access control policy administration. Ph.D Thesis, University of Cambridge, Cambridge, England.

Derakhshan, R., M.E. Orlowska and X. Li, 2007. RFID data management: Challenges and opportunities. Proceedings of the IEEE International Conference on RFID, March 26-28, 2007, Grapevine, TX., USA., pp: 175-182.

Dey, A.K., G.D. Abowd and A. Wood, 1998. CyberDesk: A framework for providing self-integrating context-aware services. Knowledge Based Syst., 11: 3-13.
Direct Link  |  

Dey, A.K., G.D. Abowd and D. Salber, 2001. A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Comput. Interact., 16: 97-166.
CrossRef  |  

Hong, J.Y., E.H. Suh and S.J. Kim, 2009. Context-aware systems: A literature review and classification. Expert Syst. Appl., 36: 8509-8522.
Direct Link  |  

Hu, V.C. and K.A. Kent, 2012. Guidelines for access control system evaluation metrics. US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, Maryland. https://pdfs.semanticscholar.org/b01a/85f6fb0d3ca85e49955af9d87cea830b55ff.pdf.

Hwang, J., T. Xie and V.C. Hu, 2009. Detection of multiple-duty-related security leakage in access control policies. Proceedings of the 3rd IEEE International Conference on Secure Software Integration and Reliability Improvement, July 8-10, 2009, IEEE, North Carolina, USA., ISBN:978-0-7695-3758-0, pp: 65-74.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved