運用mobile rfid設計rbac之 雙向認證研究

46
Edit your company slogan LOGO 運運 Mobile RFID 運運 RBAC 運 運運運運運運 運運運運 運運運運運 運運 運運運

Upload: lilah-alvarez

Post on 02-Jan-2016

47 views

Category:

Documents


3 download

DESCRIPTION

運用Mobile RFID設計RBAC之 雙向認證研究.              指導老師:陳炳彰教授              學生:林青照. 目錄. 摘要. 目錄. 第一章 緒論. 第二章 文獻探討. 第三章 系統架構與概念. 摘要.   本論文將提出一個安全的認證機制,應用 Mobile RFID 架構下的授權委任機制,讓讀取器透過後端資料庫的 RBAC 伺服器得到特定的角色權限,使得讀取器可與後端資料庫與電子標籤進行雙向認證溝通,並且可限制電子標籤的讀取次數及讀取電子標籤內的資訊以達到隱私權的保護。. 第一章 緒論. 1.1 研究背景 - PowerPoint PPT Presentation

TRANSCRIPT

Mobile RFIDRBAC(Role-class)
LOGO
2.45GHz 5.8GHz
LOGO
LOGO
14Static of Duty with Hierarchical RBAC
LOGO
15Dynamic of Duty with Hierarchical RBAC
LOGO
[2] Mobile RFIDTANETIPV6, 2009
[3] , , Off-line authentication protocol for RFID Tags, 2008 EITS2008, pp. , March 26, 2008.
[4] Mobile RFID , 2008
[5] RFIDpp1-2~1-5 , 2006
[6] RFID,pp.68-70, 2004
[7] RFID - , 2005
[8] ,RFID- pp1-2~1-14 , 2006
[9]RFID!-RFIDpp.30-312007
[10] RFID 2007
[11] RFID” 2008
[12] RFID “http://www.teema.org.tw/epaper/20080102/disquisition.html“
[14],,2000
[15]RBAC-Social Learning Space “ http://sls.weco.net/keywords/rbac ”
[16]()-, William Stallings () , 2004
[17] , , , , , 2002
[18] , , , , 2003
[19]2005
[20]RFID , , , 2009
[21] NFC, 2007 http://www.ithome.com.tw/itadm/article.php?c=43612
LOGO

[22] "Nokia unveils RFID phone reader ", IN RFID Journal,17 March 2004. http://www.rfidjournal.com/article/view/834
[23] Sepideh Fouladgar and Hossam Afifi, “A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags,” Journal of Communications, vol. 2, pp. 6-13, November 2007 IEEE.
[24] J.Ayoade,”Security implication in RFID and authentication processing framework,”Computers&Security,vol, 25, pp.207-212, 2006 IEEE
[25] Jules,A.,Ronald.,Rivest,and M.Szydlo(2003),”The Blocker TagSelective Blocking of RFID Tags for Consumer Privacy,”In V.Atlual,ed.8th ACM Conference of Computer and Communications Security,ACM Press,pp.103-111,2003
[26] Mobile CloakTM(2008),http://www.mobilecloak.com/
[28] S.Inoue and H.Yasuura,”RFID Privacy Using-controllable Uniqueness”,MIT RFID Privacy Workshop,2003
[29] M. Ohkubo, K. Suzuki and S, Kinoshita, "RFID Privacy Issues and Technical Challenges", Communications of the ACM , Vol. 48, No. 9, pp.66-71, 2005.
[30]Hillukkala,M.,Matinmikko,T,HaikioJ.,Ylisaukko-oja,A.,Strommer,E.,Ailisto,H.,Wallin,A.,Siira,E.,Poyry,A.,Tormanen,V.,Huomo,T. ,Tuikka,T.,Leskinen,S.and Salonen,J.(2007),
[31]”Physical browsing with NFC technology,”VTT Technical Research Center , 2007
[32] Electronic Engineering Times-Asia,”NFC delivers intulitive ,connected consumer experience”
[33] David Ferraiolo and Richard Kuhn ,”Role-Based Access Control” ,In Proceedings and 15th NIST-NCSC National
Computer Security Conference, Octoboer , 1992
[34] Ravi Sandhu Edward Coyne ,Hal Feinstein and Charles Yourman ,”Role-Based Access Control Modes”, IEEE
Computer ,Volumn29 ,page38-47, 1996
[35] Seban I.Gavrila and John F.Barkly ,”Formal specification for role based access control user/role relationship management”,processings of the third ACM workshop on Role-based access control,pages 81-90, 1998
[36] Ravi Sandu and Bhamidipati, “Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle
Implementation”,Journal of Computer Sercurity , Volume 7,pages 317-332,1999
[37] S. H. Chan and Z.Tari ,”A Role –Based Control for Internet Security”, IEEE Internet Computing,pp.24-34,1997
LOGO