Authentication and Access Control in RFID Based Logistics-customs Clearance Service Platform

被引:7
作者
HuiFang Deng Wen Deng Han Li HongJi Yang School of Computer Science and Engineering South China University of Technology Guangzhou PRC School of Software Engineering South China University of Technology Guangzhou PRC School of Computer Science and Technology Dalian University of Technology Dalian PRC School of Computing De Montfort University Leicester LE BH UK [1 ,2 ,3 ,4 ,4 ,1 ,510006 ,2 ,510006 ,3 ,116023 ,4 ,1 ,9 ]
机构
关键词
Content security; unified identity authentication; control transfer; access control; logistics-customs clearance service platform (LCCSP);
D O I
暂无
中图分类号
F716 [商业技术与设备];
学科分类号
020205 ; 1202 ; 120202 ; 0202 ;
摘要
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems.
引用
收藏
页码:180 / 189
页数:10
相关论文
共 4 条
[1]   Formal Reduction of Interfaces to Large-scale Process Control Systems [J].
Hussak, Walter ;
Yang, Shuang-Hua .
INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2007, 4 (04) :413-421
[2]  
A component mining approach to incubate Grid services in object-oriented legacy systems[J] . Jian-Zhi Li,Zhuo-Peng Zhang,Bing Qiao,Hong-Ji Yang.International Journal of Automation and Computing . 2006 (1)
[3]  
Enforcing security and safety models with an information flow analysis tool[J] . Roderick Chapman,Adrian Hilton.ACM SIGAda Ada Letters . 2004 (4)
[4]  
Whitepaper on Liberty Pro-tocol and Identity Theft 2004 .2 Liberty Alliance Project. http://www.projectliberty.org . 2008